{"id":8546,"date":"2026-04-20T08:17:25","date_gmt":"2026-04-20T13:17:25","guid":{"rendered":"https:\/\/cyberscoop.com\/?p=88641"},"modified":"2026-04-20T08:17:25","modified_gmt":"2026-04-20T13:17:25","slug":"why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security","status":"publish","type":"post","link":"https:\/\/ddi.mohflo.net\/index.php\/2026\/04\/20\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security\/","title":{"rendered":"Why the Axios attack proves AI is mandatory for supply chain security"},"content":{"rendered":"<p><head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\"> <meta name=\"robots\" content=\"index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1\"> <!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ --> <title>Why the Axios attack proves AI is mandatory for supply chain security | CyberScoop<\/title> <meta name=\"description\" content=\"The Axios library compromise reveals a stark reality: human-speed defense is no longer enough. Elastic\u2019s Mike Nichols explains why the public sector must embrace an &quot;agentic SOC&quot; to counter AI-driven supply chain threats and nation-state adversaries.\"> <link rel=\"canonical\" href=\"https:\/\/cyberscoop.com\/ai-powered-security-operations-axios-supply-chain-attack\/\"> <meta property=\"og:locale\" content=\"en_US\"> <meta property=\"og:type\" content=\"article\"> <meta property=\"og:title\" content=\"Why the Axios attack proves AI is mandatory for supply chain security\"> <meta property=\"og:description\" content=\"The Axios library compromise reveals a stark reality: human-speed defense is no longer enough. Elastic\u2019s Mike Nichols explains why the public sector must embrace an &quot;agentic SOC&quot; to counter AI-driven supply chain threats and nation-state adversaries.\"> <meta property=\"og:url\" content=\"https:\/\/cyberscoop.com\/ai-powered-security-operations-axios-supply-chain-attack\/\"> <meta property=\"og:site_name\" content=\"CyberScoop\"> <meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cyberscoop\/\"> <meta property=\"article:published_time\" content=\"2026-04-20T13:17:25+00:00\"> <meta property=\"article:modified_time\" content=\"2026-04-20T13:17:28+00:00\"> <meta property=\"og:image\" content=\"https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg\"> <meta property=\"og:image:width\" content=\"2081\"> <meta property=\"og:image:height\" content=\"1441\"> <meta property=\"og:image:type\" content=\"image\/jpeg\"> <meta name=\"author\" content=\"Greg Otto\"> <meta name=\"twitter:card\" content=\"summary_large_image\"> <meta name=\"twitter:creator\" content=\"@gregotto\"> <meta name=\"twitter:site\" content=\"@CyberScoopNews\"> <!-- \/ Yoast SEO Premium plugin. --> <link rel=\"dns-prefetch\" href=\"\/\/securepubads.g.doubleclick.net\">\n<link rel=\"dns-prefetch\" href=\"\/\/use.typekit.net\">\n<link rel=\"alternate\" type=\"application\/rss+xml\" title=\"CyberScoop \u00bb Feed\" href=\"https:\/\/cyberscoop.com\/feed\/\">\n<link rel=\"alternate\" type=\"application\/rss+xml\" title=\"CyberScoop \u00bb Comments Feed\" href=\"https:\/\/cyberscoop.com\/comments\/feed\/\"> <link rel=\"stylesheet\" id=\"all-css-2\" href=\"https:\/\/cyberscoop.com\/wp-includes\/css\/dist\/block-library\/style.min.css?m=1774626878g\" type=\"text\/css\" media=\"all\"> <link rel=\"stylesheet\" id=\"all-css-6\" href=\"https:\/\/cyberscoop.com\/wp-content\/mu-plugins\/search\/elasticpress\/dist\/css\/related-posts-block-styles.min.css?m=1774625888g\" type=\"text\/css\" media=\"all\"> <link rel=\"stylesheet\" id=\"all-css-8\" href=\"https:\/\/cyberscoop.com\/wp-content\/themes\/scoopnewsgroup\/dist\/css\/frontend.css?m=1775068334g\" type=\"text\/css\" media=\"all\">\n<link rel=\"stylesheet\" id=\"typekit-css\" href=\"https:\/\/use.typekit.net\/itk2qbh.css?ver=13897d660a0ac2c9c7d1\" media=\"all\"> <link rel=\"https:\/\/api.w.org\/\" href=\"https:\/\/cyberscoop.com\/wp-json\/\"><link rel=\"alternate\" title=\"JSON\" type=\"application\/json\" href=\"https:\/\/cyberscoop.com\/wp-json\/wp\/v2\/posts\/88641\"><meta name=\"generator\" content=\"WordPress 6.8.5\">\n<link rel=\"shortlink\" href=\"https:\/\/cyberscoop.com\/?p=88641\">\n<link rel=\"alternate\" title=\"oEmbed (JSON)\" type=\"application\/json+oembed\" href=\"https:\/\/cyberscoop.com\/wp-json\/oembed\/1.0\/embed?url=https%3A%2F%2Fcyberscoop.com%2Fai-powered-security-operations-axios-supply-chain-attack%2F\">\n<link rel=\"alternate\" title=\"oEmbed (XML)\" type=\"text\/xml+oembed\" href=\"https:\/\/cyberscoop.com\/wp-json\/oembed\/1.0\/embed?url=https%3A%2F%2Fcyberscoop.com%2Fai-powered-security-operations-axios-supply-chain-attack%2F&amp;format=xml\"> <!-- Google Tag Manager --> <!-- End Google Tag Manager --> <link rel=\"icon\" href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=32\" sizes=\"32x32\">\n<link rel=\"icon\" href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=192\" sizes=\"192x192\">\n<link rel=\"apple-touch-icon\" href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=180\">\n<meta name=\"msapplication-TileImage\" content=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=270\"> <\/head><body class=\"wp-singular post-template-default single single-post postid-88641 single-format-standard wp-theme-scoopnewsgroup wp-child-theme-cyberscoop\" id=\"readabilityBody\"> <a href=\"https:\/\/cyberscoop.com\/ai-powered-security-operations-axios-supply-chain-attack\/#main\" class=\"skip-to-content-link visually-hidden-focusable\">Skip to main content<\/a> <\/p>\n<div class=\"ad ad--top ad--top-desktop\">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p> <main id=\"main\" role=\"main\" tabindex=\"-1\"> <\/p>\n<div class=\"ad ad--top ad--top-mobile\">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<section id=\"stickybar\" class=\"stickybar stickybar--newsletter js-stickybar\" readability=\"0.82\"> <button class=\"stickybar__close js-stickybar-close\" aria-controls=\"stickybar\"> <svg class=\"icon icon--close\" width=\"21\" height=\"22\" viewBox=\"0 0 21 22\" fill=\"none\"><path d=\"m.822.518-.805.805L9.695 11 .017 20.678l.805.805 9.678-9.678 9.677 9.678.806-.805L11.305 11l9.678-9.677-.806-.805-9.677 9.677L.822.518Z\" fill=\"currentColor\" \/><\/svg> <span class=\"visually-hidden\">Close<\/span> <\/button> <\/section>\n<article class=\"single-article content\">\n<div class=\"single-article__container js-single-article-content\">\n<header class=\"single-article__header \">\n<div class=\"single-article__header-content\" readability=\"30.260377358491\">\n<ul class=\"single-article__eyebrow\">\n<li class=\"single-article__category\"> <a class=\"single-article__category-link\" href=\"https:\/\/cyberscoop.com\/ai-powered-security-operations-axios-supply-chain-attack\/\"> <span>Commentary<\/span> <\/a> <\/li>\n<\/ul>\n<p> <!-- Listen to this article section --> <!-- Audio Element --><br \/>\n<audio id=\"audio-player\" src=\"https:\/\/wp-tts-cdn.api.scpnewsgrp.com\/cyberscoop\/88641\/english.openai.mp3\"><\/audio> <\/p>\n<div readability=\"11\">\n<div>\n<p>Listen to this article<\/p>\n<p> <!-- Countdown Timer --> <\/p>\n<p>0:00<\/p>\n<\/p><\/div>\n<p> <!-- Tooltip --> <\/p>\n<p> <span id=\"tts-tooltip\">Learn more.<\/span> <span> This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment. <\/span> <\/p>\n<\/div>\n<p> <!-- End of audio player --> <\/div>\n<div class=\"single-article__cover-wrap\">\n<figure class=\"single-article__cover\"> <img data-recalc-dims=\"1\" fetchpriority=\"high\" width=\"640\" height=\"443\" src=\"https:\/\/i0.wp.com\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security.jpg?resize=640%2C443&#038;ssl=1\" class=\"single-article__cover-image wp-post-image\" alt decoding=\"async\" fetchpriority=\"high\" srcset=\"https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg 2081w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=300,208 300w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=768,532 768w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=1024,709 1024w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=1536,1064 1536w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=2048,1418 2048w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=600,415 600w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=243,168 243w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=487,337 487w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=975,675 975w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-2.jpg?resize=1217,843 1217w\" sizes=\"(max-width: 975px) 100vw, 975px\"><figcaption> (Getty Images) <\/figcaption><\/figure>\n<\/p><\/div>\n<\/header>\n<div class=\"single-article__content\">\n<div class=\"single-article__content-inner has-drop-cap\"> <html readability=\"57.345792826014\"><body readability=\"115.72796013061\"><\/p>\n<p>Two weeks ago, a suspected North Korean threat actor slipped malicious code into a package <a href=\"https:\/\/cyberscoop.com\/axios-software-developer-tool-attack-compromise\/\">within Axios<\/a>, a widely used JavaScript library. The immediate concern was the blast radius: roughly 100 million weekly downloads spanning enterprises, startups, and government systems. But beyond the sheer scale, the attack\u2019s speed was just as worrisome \u2013 a stark reminder of the tempo modern adversaries now operate at.<\/p>\n<p>The Axios compromise was identified within minutes of publication <a href=\"https:\/\/www.elastic.co\/security-labs\/how-we-caught-the-axios-supply-chain-attack#where-we-go-from-here\">by an Elastic researcher<\/a> using an AI-powered monitoring tool that analyzed package registry changes in real time. The approach was right: <a href=\"https:\/\/cyberscoop.com\/tag\/artificial-intelligence-ai\/\">AI<\/a> classifying code changes at machine speed, at the moment of publication, before the damage compounds. By any standard, it was a fast response. The compromised package was removed in about three hours. But even in those three hours, the widely-used package <a href=\"https:\/\/cyberscoop.com\/axios-software-developer-tool-attack-compromise\/\">may have been downloaded<\/a> over half a million times.<\/p>\n<p>This underscores a new reality. Enterprises and the public sector are being overwhelmed with attacks that are increasing in both speed and complexity, driven in part by AI. Adversaries are probing every link in the supply chain, and they are doing it at a pace that human-speed defenses cannot match.<\/p>\n<p>This project is one example of using AI to tackle a security problem, but it also makes a broader case: AI-powered security can dramatically improve SOC efficiency especially when organizations across the public sector and beyond are drowning in attacks.<\/p>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<h4 class=\"wp-block-heading\" id=\"h-the-direct-threat-to-the-public-sector\">The direct threat to the public sector<\/h4>\n<p><a href=\"https:\/\/cyberscoop.com\/news\/government\/\">Government<\/a> agencies increasingly rely on the same <a href=\"https:\/\/cyberscoop.com\/tag\/open-source\/\">open-source<\/a> JavaScript frameworks as the private sector, so a poisoned package can give an adversary access to sensitive systems before anyone realizes the supply chain has been poisoned. This is a direct threat to <a href=\"https:\/\/cyberscoop.com\/tag\/national-security\/\">national security<\/a> and critical infrastructure, especially when the payloads are cross-platform, affecting macOS, Windows, and Linux.<\/p>\n<p>What is most critical now is understanding and correctly preparing for the frequency and speed at which these attacks occur.<\/p>\n<p>AI has fundamentally lowered the barrier to sophisticated cyber operations, granting relatively unsophisticated bad actors and small nation-states capabilities once reserved for elite criminal groups and countries. Adversaries now leverage AI to automate reconnaissance, craft convincing <a href=\"https:\/\/cyberscoop.com\/tag\/social-engineering\/\">social engineering<\/a>, and develop evasive malware. With a new vulnerability discovered every few minutes, the pace is accelerating.<\/p>\n<p>For the public sector, the threat model has expanded. Defending against known nation-state playbooks is no longer sufficient\u2014that\u2019s just the baseline. Groups that couldn\u2019t execute at nation-state levels five years ago now operate with comparable sophistication, while state-sponsored actors operate with unprecedented speed and automation. Staying ahead means moving beyond traditional defense to meet a threat landscape that is increasingly automated and ubiquitous.<\/p>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<h4 class=\"wp-block-heading\" id=\"h-ai-is-not-optional\">AI is not optional<\/h4>\n<p>Adversarial AI is the defining threat of the current operating environment. Automated reconnaissance. AI-generated obfuscation. Machine-speed deployment across multiple vectors simultaneously. The adversary has implemented AI faster and more aggressively than most defensive teams.<\/p>\n<p>It is rapidly becoming unquestionable in security: if you are not using AI to battle AI, you will lose.<\/p>\n<p>That does not mean buying into the autonomous SOC fantasy. That approach treats AI in isolation, as if defenders are the only ones with access to the technology. Defensive AI is not a win button, but the minimum entry fee to stay level with the attacker. You still need business context, mission knowledge, and human judgment.<\/p>\n<h4 class=\"wp-block-heading\" id=\"h-the-agentic-soc-transformation\">The agentic SOC transformation<\/h4>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p>The Axios compromise should serve as a clear signal. Nation-state actors are targeting the software supply chain with increasing frequency and sophistication. The government agencies and organizations that will defend successfully against these threats are the ones building security operations that can move just as fast as the threat actors they face.<\/p>\n<p>AI-driven security operations that can match the speed of modern threats, like agentic workflows that automatically triage, investigate, and contain suspicious activity are operationally necessary. <a href=\"https:\/\/www.elastic.co\/blog\/ai-cybersecurity-arms-race-agentic-soc\">Having an agentic SOC mindset and approach<\/a> to how these centers work will empower analysts\u2019 activity. Agents will operate on behalf of the analyst automatically and transparently.<\/p>\n<p>The traditional SOC pyramid puts humans at the bottom doing the highest-volume work. A wide analyst tier triaging alerts, feeding a narrower senior tier handling investigations. Adversarial AI has made that base layer untenable. The volume is too high, the speed too fast, the surface area too broad. The pyramid inverts into a diamond \u2013 AI takes the base while analysts rise to become threat engineers: managing, validating, and improving the agents working on their behalf.<\/p>\n<p>AI agents handle the high-volume work of alert correlation, investigation enrichment, and initial containment while human analysts focus on strategic decisions and mission context. These agents amplify the expertise that government security professionals bring, delivering pre-investigated, correlated findings rather than a flood of disconnected alerts.<\/p>\n<p>The rapid acceleration of sophisticated attacks calls for this essential change across the SOC. The public sector and industry are undergoing a significant transformation, shifting away from eyes-on-glass alert triage toward a high-impact era of threat engineering. In doing so, public sector teams will have the ability to greatly reduce mean time to detect\/respond, in turn reducing SOC analyst fatigue and compressing investigation timelines.<\/p>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p><em>Mike Nichols is the GM of Security at Elastic.<\/em><\/p>\n<p><\/body> <\/p>\n<footer class=\"single-article__footer\" readability=\"0.61643835616438\">\n<div class=\"author-card\" readability=\"7\">\n<div class=\"author-card__avatar\">\n<figure class=\"author-card__image-wrap\"> <img data-recalc-dims=\"1\" decoding=\"async\" class=\"author-card__image\" src=\"https:\/\/i0.wp.com\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-1.jpg?w=640&#038;ssl=1\" alt=\"Mike Nichols\"> <\/figure>\n<\/p><\/div>\n<p><h4 class=\"author-card__name\">Written by Mike Nichols<\/h4>\n<p> Mike Nichols is the GM of Security for Elastic. <\/p>\n<\/p><\/div>\n<div class=\"single-article__tags-container\">\n<h4 class=\"single-article__tags-title\">In This Story<\/h4>\n<\/p><\/div>\n<\/footer>\n<p> <\/html><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"single-article__ads js-single-article-sidebar\">\n<div class=\"ad ad--sidebar js-single-article-sidebar-5 ad--rightrail_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<div class=\"ad ad--sidebar js-single-article-sidebar-4 ad--rightrail_2 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<div class=\"ad ad--sidebar js-single-article-sidebar-3 ad--rightrail_3 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div><\/div>\n<\/article>\n<div class=\"popular-stories popular-stories--single-post\">\n<div class=\"popular-stories__container\">\n<h2 class=\"popular-stories__title\"> More Scoops <\/h2>\n<p> <!-- .popular-stories__stories --> <\/div>\n<p><!-- .popular-stories__inner -->\n<\/div>\n<p><!-- .popular-stories --> <\/p>\n<section class=\"latest-podcasts\">\n<h2 class=\"latest-podcasts__title\"> Latest Podcasts\t<\/h2>\n<\/section>\n<div class=\"top-categories\">\n<div class=\"top-categories__container\">\n<h3 class=\"top-categories__category-title\">Government<\/h3>\n<\/p><\/div>\n<div class=\"top-categories__container\">\n<h3 class=\"top-categories__category-title\">Technology<\/h3>\n<\/p><\/div>\n<\/p><\/div>\n<p> <\/main> <\/p>\n<div class=\"ad ad--bottom \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<div id=\"interstitial\" class=\"welcome__container\"> <button id=\"close-modal-1\" class=\"welcome__clickable_area\"><\/button> <\/p>\n<div class=\"welcome__ad_wrapper\">\n<p> <button id=\"close-modal-3\" class=\"welcome__continue-button\">Continue to CyberScoop<\/button> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> <!-- Start of HubSpot Embed Code --> <!-- End of HubSpot Embed Code --> <\/body> <a href=\"https:\/\/cyberscoop.com\/ai-powered-security-operations-axios-supply-chain-attack\/\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why the Axios attack proves AI is mandatory for supply<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[235,384,6459,280,3935,2807,1073],"tags":[236,388,6460,284,3936,2808,1076],"class_list":["post-8546","post","type-post","status-publish","format-standard","hentry","category-ai","category-artificial-intelligence-ai","category-axios","category-commentary","category-elastic","category-op-ed","category-open-source","tag-ai","tag-artificial-intelligence-ai","tag-axios","tag-commentary","tag-elastic","tag-op-ed","tag-open-source"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","chromenews-featured":"","chromenews-large":"","chromenews-medium":""},"author_info":{"display_name":"Cyber Scoop","author_link":"https:\/\/ddi.mohflo.net\/index.php\/author\/cyberscoop\/"},"category_info":"<a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/ai\/\" rel=\"category tag\">AI<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/artificial-intelligence-ai\/\" rel=\"category tag\">artificial intelligence (AI)<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/axios\/\" rel=\"category tag\">axios<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/commentary\/\" rel=\"category tag\">Commentary<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/elastic\/\" rel=\"category tag\">Elastic<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/op-ed\/\" rel=\"category tag\">op-ed<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/open-source\/\" rel=\"category tag\">open source<\/a>","tag_info":"open source","comment_count":"0","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts\/8546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/comments?post=8546"}],"version-history":[{"count":0,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts\/8546\/revisions"}],"wp:attachment":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/media?parent=8546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/categories?post=8546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/tags?post=8546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}