{"id":8568,"date":"2026-04-22T05:00:00","date_gmt":"2026-04-22T10:00:00","guid":{"rendered":"https:\/\/cyberscoop.com\/?p=88694"},"modified":"2026-04-22T05:00:00","modified_gmt":"2026-04-22T10:00:00","slug":"the-ai-era-demands-a-different-kind-of-ciso","status":"publish","type":"post","link":"https:\/\/ddi.mohflo.net\/index.php\/2026\/04\/22\/the-ai-era-demands-a-different-kind-of-ciso\/","title":{"rendered":"The AI era demands a different kind of CISO"},"content":{"rendered":"<p><head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\"> <meta name=\"robots\" content=\"index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1\"> <!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ --> <title>The AI era demands a different kind of CISO | CyberScoop<\/title> <meta name=\"description\" content=\"Static audits can\u2019t stop AI-speed attacks. Rinki Sethi argues why CISOs must shift from periodic compliance to real-time risk awareness to survive the modern threat landscape.\"> <link rel=\"canonical\" href=\"https:\/\/cyberscoop.com\/ciso-strategy-ai-real-time-risk-op-ed\/\"> <meta property=\"og:locale\" content=\"en_US\"> <meta property=\"og:type\" content=\"article\"> <meta property=\"og:title\" content=\"The AI era demands a different kind of CISO\"> <meta property=\"og:description\" content=\"Static audits can\u2019t stop AI-speed attacks. Rinki Sethi argues why CISOs must shift from periodic compliance to real-time risk awareness to survive the modern threat landscape.\"> <meta property=\"og:url\" content=\"https:\/\/cyberscoop.com\/ciso-strategy-ai-real-time-risk-op-ed\/\"> <meta property=\"og:site_name\" content=\"CyberScoop\"> <meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cyberscoop\/\"> <meta property=\"article:published_time\" content=\"2026-04-22T10:00:00+00:00\"> <meta property=\"og:image\" content=\"https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg\"> <meta property=\"og:image:width\" content=\"2044\"> <meta property=\"og:image:height\" content=\"1466\"> <meta property=\"og:image:type\" content=\"image\/jpeg\"> <meta name=\"author\" content=\"Greg Otto\"> <meta name=\"twitter:card\" content=\"summary_large_image\"> <meta name=\"twitter:creator\" content=\"@gregotto\"> <meta name=\"twitter:site\" content=\"@CyberScoopNews\"> <!-- \/ Yoast SEO Premium plugin. --> <link rel=\"dns-prefetch\" href=\"\/\/securepubads.g.doubleclick.net\">\n<link rel=\"dns-prefetch\" href=\"\/\/use.typekit.net\">\n<link rel=\"alternate\" type=\"application\/rss+xml\" title=\"CyberScoop \u00bb Feed\" href=\"https:\/\/cyberscoop.com\/feed\/\">\n<link rel=\"alternate\" type=\"application\/rss+xml\" title=\"CyberScoop \u00bb Comments Feed\" href=\"https:\/\/cyberscoop.com\/comments\/feed\/\"> <link rel=\"stylesheet\" id=\"all-css-2\" href=\"https:\/\/cyberscoop.com\/wp-includes\/css\/dist\/block-library\/style.min.css?m=1774626878g\" type=\"text\/css\" media=\"all\"> <link rel=\"stylesheet\" id=\"all-css-6\" href=\"https:\/\/cyberscoop.com\/wp-content\/mu-plugins\/search\/elasticpress\/dist\/css\/related-posts-block-styles.min.css?m=1774625888g\" type=\"text\/css\" media=\"all\"> <link rel=\"stylesheet\" id=\"all-css-8\" href=\"https:\/\/cyberscoop.com\/wp-content\/themes\/scoopnewsgroup\/dist\/css\/frontend.css?m=1775068334g\" type=\"text\/css\" media=\"all\">\n<link rel=\"stylesheet\" id=\"typekit-css\" href=\"https:\/\/use.typekit.net\/itk2qbh.css?ver=13897d660a0ac2c9c7d1\" media=\"all\"> <link rel=\"https:\/\/api.w.org\/\" href=\"https:\/\/cyberscoop.com\/wp-json\/\"><link rel=\"alternate\" title=\"JSON\" type=\"application\/json\" href=\"https:\/\/cyberscoop.com\/wp-json\/wp\/v2\/posts\/88694\"><meta name=\"generator\" content=\"WordPress 6.8.5\">\n<link rel=\"shortlink\" href=\"https:\/\/cyberscoop.com\/?p=88694\">\n<link rel=\"alternate\" title=\"oEmbed (JSON)\" type=\"application\/json+oembed\" href=\"https:\/\/cyberscoop.com\/wp-json\/oembed\/1.0\/embed?url=https%3A%2F%2Fcyberscoop.com%2Fciso-strategy-ai-real-time-risk-op-ed%2F\">\n<link rel=\"alternate\" title=\"oEmbed (XML)\" type=\"text\/xml+oembed\" href=\"https:\/\/cyberscoop.com\/wp-json\/oembed\/1.0\/embed?url=https%3A%2F%2Fcyberscoop.com%2Fciso-strategy-ai-real-time-risk-op-ed%2F&amp;format=xml\"> <!-- Google Tag Manager --> <!-- End Google Tag Manager --> <link rel=\"icon\" href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=32\" sizes=\"32x32\">\n<link rel=\"icon\" href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=192\" sizes=\"192x192\">\n<link rel=\"apple-touch-icon\" href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=180\">\n<meta name=\"msapplication-TileImage\" content=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=270\"> <\/head><body class=\"wp-singular post-template-default single single-post postid-88694 single-format-standard wp-theme-scoopnewsgroup wp-child-theme-cyberscoop\" id=\"readabilityBody\"> <a href=\"https:\/\/cyberscoop.com\/ciso-strategy-ai-real-time-risk-op-ed\/#main\" class=\"skip-to-content-link visually-hidden-focusable\">Skip to main content<\/a> <\/p>\n<div class=\"ad ad--top ad--top-desktop\">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p> <main id=\"main\" role=\"main\" tabindex=\"-1\"> <\/p>\n<div class=\"ad ad--top ad--top-mobile\">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<section id=\"stickybar\" class=\"stickybar stickybar--newsletter js-stickybar\" readability=\"0.82\"> <button class=\"stickybar__close js-stickybar-close\" aria-controls=\"stickybar\"> <svg class=\"icon icon--close\" width=\"21\" height=\"22\" viewBox=\"0 0 21 22\" fill=\"none\"><path d=\"m.822.518-.805.805L9.695 11 .017 20.678l.805.805 9.678-9.678 9.677 9.678.806-.805L11.305 11l9.678-9.677-.806-.805-9.677 9.677L.822.518Z\" fill=\"currentColor\" \/><\/svg> <span class=\"visually-hidden\">Close<\/span> <\/button> <\/section>\n<article class=\"single-article content\">\n<div class=\"single-article__container js-single-article-content\">\n<header class=\"single-article__header \" readability=\"25.714285714286\">\n<div class=\"single-article__header-content\" readability=\"35.176056338028\">\n<ul class=\"single-article__eyebrow\">\n<li class=\"single-article__category\"> <a class=\"single-article__category-link\" href=\"https:\/\/cyberscoop.com\/ciso-strategy-ai-real-time-risk-op-ed\/\"> <span>Commentary<\/span> <\/a> <\/li>\n<\/ul>\n<p> When attackers can discover and exploit vulnerabilities in minutes, last quarter&#8217;s audit doesn&#8217;t mean much. CISOs need to shift from static measurement to real-time awareness &#8212; and fast. <\/p>\n<p> <!-- Listen to this article section --> <!-- Audio Element --><br \/>\n<audio id=\"audio-player\" src=\"https:\/\/wp-tts-cdn.api.scpnewsgrp.com\/cyberscoop\/88694\/english.openai.mp3\"><\/audio> <\/p>\n<div readability=\"11\">\n<div>\n<p>Listen to this article<\/p>\n<p> <!-- Countdown Timer --> <\/p>\n<p>0:00<\/p>\n<\/p><\/div>\n<p> <!-- Tooltip --> <\/p>\n<p> <span id=\"tts-tooltip\">Learn more.<\/span> <span> This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment. <\/span> <\/p>\n<\/div>\n<p> <!-- End of audio player --> <\/div>\n<div class=\"single-article__cover-wrap\">\n<figure class=\"single-article__cover\"> <img data-recalc-dims=\"1\" fetchpriority=\"high\" width=\"640\" height=\"459\" src=\"https:\/\/i0.wp.com\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso.jpg?resize=640%2C459&#038;ssl=1\" class=\"single-article__cover-image wp-post-image\" alt decoding=\"async\" fetchpriority=\"high\" srcset=\"https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg 2044w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg?resize=300,215 300w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg?resize=768,551 768w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg?resize=1024,734 1024w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg?resize=1536,1102 1536w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg?resize=600,430 600w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg?resize=234,168 234w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg?resize=470,337 470w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg?resize=941,675 941w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso-1.jpg?resize=1175,843 1175w\" sizes=\"(max-width: 941px) 100vw, 941px\"><figcaption> (Getty Images) <\/figcaption><\/figure>\n<\/p><\/div>\n<\/header>\n<div class=\"single-article__content\">\n<div class=\"single-article__content-inner has-drop-cap\"> <html readability=\"62.105627851952\"><body readability=\"125.52764761012\"><\/p>\n<p>Many security leaders are still operating with frameworks built for a different era. For years, success was measured by fixed checkpoints, such as passing audits, closing vulnerabilities, and maintaining compliance. Those markers still have value, but they were designed for a threat landscape that moved in predictable, linear ways.<\/p>\n<p>Today, that landscape is shifting in real time. <a href=\"https:\/\/cyberscoop.com\/tag\/artificial-intelligence-ai\/\">AI<\/a> is accelerating how attackers can identify and exploit weaknesses, while cloud environments and autonomous systems are constantly changing the terrain. The result is a gap between how risk is measured and how it actually unfolds, where static signals can\u2019t keep up with dynamic threats.<\/p>\n<p>CISOs are under pressure from two directions: risk is growing, and the tools meant to measure it are struggling to keep up. Traditional indicators often reflect yesterday\u2019s threat landscape, leaving security leaders with an incomplete picture of where they actually stand.<\/p>\n<h4 class=\"wp-block-heading\" id=\"h-the-mythos-signal\">The Mythos signal<\/h4>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p><a href=\"https:\/\/cyberscoop.com\/project-glasswing-anthropic-ai-open-source-software-vulnerabilities\/\">Recent reports<\/a> about Anthropic\u2019s Claude Mythos Preview, described as so effective at vulnerability discovery that access has been restricted, offer a clear signal of where cybersecurity is headed. AI models like this one demonstrate that the speed and scale of exploitation have fundamentally changed. What once took skilled attackers days or weeks can now happen in minutes, and increasingly without human intervention.<\/p>\n<p>That shift matters because attacker capabilities are accelerating faster than most organizations can measure them. The gap between how <a href=\"https:\/\/cyberscoop.com\/tag\/risk-management\/\">risk<\/a> unfolds and how security teams track it is widening. A \u201cpassed\u201d audit tells you where you\u2019ve been, not where you are. A posture dashboard reflects a moment in time, not a continuously changing environment. And a pen test is a snapshot, in a world where conditions evolve constantly.<\/p>\n<h4 class=\"wp-block-heading\" id=\"h-sharpening-the-conversation-this-quarter\">Sharpening the conversation this quarter<\/h4>\n<p>If your conversations haven\u2019t evolved to match this new reality, your organization has a significant blind spot. Here are five questions CISOs should be using to turn the current shift into action:<\/p>\n<p><strong>What can we see at runtime without waiting for a report?<\/strong><br \/>Configuration tools tell you what should be true. Runtime visibility tells you what is true right now. (<em><strong>Follow up: <\/strong>If an attacker starts moving laterally in our cloud environment today, how fast do we know, in minutes or days?<\/em>)<\/p>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p><strong>Do we have a complete inventory of identities, including non-human?<\/strong><br \/>Business environments are full of identities beyond employees. Vendors, contractors, service accounts, API keys, automations, machine identities, and cloud principals sprawl across systems. Attackers love that sprawl because stealing credentials is often easier than writing malware.<br \/>(<em><strong>Follow up:<\/strong> How many human and non-human identities do we have, and which ones can access sensitive data or modify critical infrastructure?<\/em>)<\/p>\n<p><strong>Where are we over-permissioned, and how quickly can we reduce it?<\/strong><br \/>Over-permissioned accounts act like master keys: convenient until they\u2019re compromised. Least privilege must be measurable, not aspirational. (<em><strong>Follow up: <\/strong>Can you show me the highest-risk access paths and what we can remove or tighten in 30 days?<\/em>)<\/p>\n<p><strong>Are we using AI to reduce noise and speed decisions or just adding another screen?<\/strong><br \/>Many teams are drowning in alerts. AI can help by adding context (connecting a risky identity + vulnerable workload + exposed secret) so responders can act quickly, instead of chasing disconnected warnings. <em>(<strong>Follow up:<\/strong> What\u2019s our alert volume, what percentage is actionable, and what\u2019s improved response time?)<\/em><\/p>\n<p><strong>Can you walk me through a realistic incident end to end, with decision points?<\/strong><br \/>Prevention matters, but resilience is what separates organizations when something gets through. Incidents are inevitable. What matters is detection speed, containment, recovery, and communications. (<em><strong>Follow up:<\/strong> Pick a scenario \u2014 credential theft, ransomware, vendor compromise \u2014 What happens here, who decides what, and when does executive leadership need to know? What do customers need to know?<\/em>)<\/p>\n<h4 class=\"wp-block-heading\" id=\"h-what-to-do-with-the-answers\">What to do with the answers<\/h4>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p>If these questions surface gaps, the path forward is usually practical. Start by prioritizing runtime visibility on systems that support critical services and sensitive resident data. Treat identity like infrastructure \u2014 inventory it, right-size permissions, and monitor continuously. Shift measurement toward outcomes like time to detect, contain, and restore, rather than activity metrics like tickets closed or controls checked. And rehearse the hard day with both technical teams and leadership, including communications.<\/p>\n<p>In an era where threats move at AI speed, the advantage belongs to teams that can see clearly and act immediately. The defining question now is how quickly you can identify a risk, understand its impact, and respond before it escalates.<\/p>\n<p><em>Rinki Sethi is the chief security &amp; strategy officer at Upwind Security, holding over two decades of cybersecurity leadership experience from roles at Twitter, Rubrik, BILL, Palo Alto Networks, IBM, and eBay. She is a founding partner at Lockstep Ventures, serves on the boards of ForgeRock and Vaultree, and is widely recognized for her contributions to the cybersecurity community, including developing the first national cybersecurity curriculum for the Girl Scouts of USA.<\/em><\/p>\n<p><\/body> <\/p>\n<footer class=\"single-article__footer\" readability=\"6.2289156626506\">\n<div class=\"author-card\" readability=\"19\">\n<div class=\"author-card__avatar\">\n<figure class=\"author-card__image-wrap\"> <img data-recalc-dims=\"1\" decoding=\"async\" class=\"author-card__image\" src=\"https:\/\/i0.wp.com\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/the-ai-era-demands-a-different-kind-of-ciso.png?w=640&#038;ssl=1\" alt=\"Rinki Sethi\"> <\/figure>\n<\/p><\/div>\n<p><h4 class=\"author-card__name\">Written by Rinki Sethi<\/h4>\n<p> Rinki Sethi is the chief security &amp; strategy officer at Upwind Security, holding over two decades of cybersecurity leadership experience from roles at Twitter, Rubrik, BILL, Palo Alto Networks, IBM, and eBay. She is a founding partner at Lockstep Ventures, serves on the boards of ForgeRock and Vaultree, and is widely recognized for her contributions to the cybersecurity community, including developing the first national cybersecurity curriculum for the Girl Scouts of USA. <\/p>\n<\/p><\/div>\n<div class=\"single-article__tags-container\">\n<h4 class=\"single-article__tags-title\">In This Story<\/h4>\n<\/p><\/div>\n<\/footer>\n<p> <\/html><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"single-article__ads js-single-article-sidebar\">\n<div class=\"ad ad--sidebar js-single-article-sidebar-5 ad--rightrail_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<div class=\"ad ad--sidebar js-single-article-sidebar-4 ad--rightrail_2 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<div class=\"ad ad--sidebar js-single-article-sidebar-3 ad--rightrail_3 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div><\/div>\n<\/article>\n<div class=\"popular-stories popular-stories--single-post\">\n<div class=\"popular-stories__container\">\n<h2 class=\"popular-stories__title\"> More Scoops <\/h2>\n<p> <!-- .popular-stories__stories --> <\/div>\n<p><!-- .popular-stories__inner -->\n<\/div>\n<p><!-- .popular-stories --> <\/p>\n<section class=\"latest-podcasts\">\n<h2 class=\"latest-podcasts__title\"> Latest Podcasts\t<\/h2>\n<\/section>\n<div class=\"top-categories\">\n<div class=\"top-categories__container\">\n<h3 class=\"top-categories__category-title\">Government<\/h3>\n<\/p><\/div>\n<div class=\"top-categories__container\">\n<h3 class=\"top-categories__category-title\">Technology<\/h3>\n<\/p><\/div>\n<\/p><\/div>\n<p> <\/main> <\/p>\n<div class=\"ad ad--bottom \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<div id=\"interstitial\" class=\"welcome__container\"> <button id=\"close-modal-1\" class=\"welcome__clickable_area\"><\/button> <\/p>\n<div class=\"welcome__ad_wrapper\">\n<p> <button id=\"close-modal-3\" class=\"welcome__continue-button\">Continue to CyberScoop<\/button> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> <!-- Start of HubSpot Embed Code --> <!-- End of HubSpot Embed Code --> <\/body> <a href=\"https:\/\/cyberscoop.com\/ciso-strategy-ai-real-time-risk-op-ed\/\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The AI era demands a different kind of CISO |<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[235,384,280,2659,3051,6469],"tags":[236,388,284,2661,3053,6470],"class_list":["post-8568","post","type-post","status-publish","format-standard","hentry","category-ai","category-artificial-intelligence-ai","category-commentary","category-exploit","category-risk-management","category-security-audit","tag-ai","tag-artificial-intelligence-ai","tag-commentary","tag-exploit","tag-risk-management","tag-security-audit"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","chromenews-featured":"","chromenews-large":"","chromenews-medium":""},"author_info":{"display_name":"Cyber Scoop","author_link":"https:\/\/ddi.mohflo.net\/index.php\/author\/cyberscoop\/"},"category_info":"<a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/ai\/\" rel=\"category tag\">AI<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/artificial-intelligence-ai\/\" rel=\"category tag\">artificial intelligence (AI)<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/commentary\/\" rel=\"category tag\">Commentary<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/exploit\/\" rel=\"category tag\">exploit<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/risk-management\/\" rel=\"category tag\">risk management<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/security-audit\/\" rel=\"category tag\">security audit<\/a>","tag_info":"security audit","comment_count":"0","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts\/8568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/comments?post=8568"}],"version-history":[{"count":0,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts\/8568\/revisions"}],"wp:attachment":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/media?parent=8568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/categories?post=8568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/tags?post=8568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}