{"id":92521,"date":"2021-01-19T09:00:19","date_gmt":"2021-01-19T17:00:19","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92521"},"modified":"2023-05-15T23:03:08","modified_gmt":"2023-05-16T06:03:08","slug":"how-it-leaders-are-securing-identities-with-zero-trust","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/","title":{"rendered":"How IT leaders are securing identities with Zero Trust"},"content":{"rendered":"

The\u00a0past twelve months\u00a0have been a remarkable time of digital transformation as organizations, and especially digital security teams,\u00a0adapt to working remotely and shifting business operations.\u00a0IT leaders everywhere\u00a0turned to Zero Trust approaches to alleviate the challenges of enabling and securing remote work. Using Zero Trust to secure users, data, and devices (wherever they may be) has changed from optional to a business imperative overnight.<\/p>\n

In this short report, we surveyed\u00a0IT leaders around the world to determine how they\u2019re implementing Zero Trust practices to\u00a0protect\u00a0their identities\u00a0and ensure\u00a0their employees have secure access to resources.\"A<\/a><\/p>\n

    \n
  1. Most IT leaders are already using Zero Trust practices with their identity management solutions. <\/strong>While the majority of IT leaders have already implemented Zero Trust practices into their identity and access\u00a0solution,\u00a0only a monitory have moved on to more advanced controls that utilize automation and AI-based threat analysis.<\/li>\n
  2. Multi-factor authentication (MFA) and Single Sign-On (SSO) are the most common<\/strong>.\u00a0Additionally, a majority are analyzing risk before granting access\u2014a critical proactive step to\u00a0preventing unauthorized access to corporate resources.<\/li>\n
  3. Identities and devices are the top priority for most organizations<\/strong>.\u00a0With\u00a0employees working outside the corporate network and increasingly using personal devices, this is no surprise.\u00a0However,\u00a0surprisingly,\u00a0the majority of IT leaders do not\u00a0rate identities as the most\u00a0mature\u00a0component\u00a0in\u00a0their\u00a0Zero Trust strategy.<\/li>\n
  4. Zero Trust is still in infancy<\/strong>.\u00a0Despite substantial growth in Zero Trust efforts over the past twelve months, only one in ten IT leaders report feeling very confident in their Zero Trust identity management roadmap.<\/li>\n<\/ol>\n

    Read the full report for more details<\/a>.<\/p>\n

    If you\u2019re looking for how to help prevent endpoints from being the weakest link in your security strategy, check out our Zero Trust deployment guidance for identities<\/a>.<\/p>\n

    To learn more about Microsoft Security solutions visit our\u00a0website<\/a>.\u00a0 Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"

    The\u00a0past twelve months\u00a0have been a remarkable time of digital transformation as organizations, and especially digital security teams,\u00a0adapt to working remotely and shifting business operations.\u00a0IT leaders everywhere\u00a0turned to Zero Trust approaches to alleviate the challenges of enabling and securing remote work. Using Zero Trust to secure users, data, and devices (wherever they may be) has changed […]<\/p>\n","protected":false},"author":96,"featured_media":92523,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3659],"topic":[3673,3689],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[2174],"class_list":["post-92521","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-identity-and-access-management","topic-zero-trust","tag-microsoft-security-insights"],"yoast_head":"\nHow IT leaders are securing identities with Zero Trust | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How IT leaders are securing identities with Zero Trust | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"The\u00a0past twelve months\u00a0have been a remarkable time of digital transformation as organizations, and especially digital security teams,\u00a0adapt to working remotely and shifting business operations.\u00a0IT leaders everywhere\u00a0turned to Zero Trust approaches to alleviate the challenges of enabling and securing remote work. Using Zero Trust to secure users, data, and devices (wherever they may be) has changed […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-19T17:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:03:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1-1024x682.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"682\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nupur Goyal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nupur Goyal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/nupur-goyal\/\",\"@type\":\"Person\",\"@name\":\"Nupur Goyal\"}],\"headline\":\"How IT leaders are securing identities with Zero Trust\",\"datePublished\":\"2021-01-19T17:00:19+00:00\",\"dateModified\":\"2023-05-16T06:03:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/\"},\"wordCount\":343,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg\",\"keywords\":[\"Microsoft Security Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/\",\"name\":\"How IT leaders are securing identities with Zero Trust | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg\",\"datePublished\":\"2021-01-19T17:00:19+00:00\",\"dateModified\":\"2023-05-16T06:03:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"MSC17_dataCenter Microsoft Contact: Stephen Smith (stepsmit) Agency: Cinco Design Agency Contact: Kate Callahan (kate@cincodesign.com) Photographer: Amy Sacka (http:\/\/www.amysackaphotography.com\/) Shoot month: March 2017 Location: Portland, OR Business: LinkedIn Datacenter\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How IT leaders are securing identities with Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How IT leaders are securing identities with Zero Trust | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"How IT leaders are securing identities with Zero Trust | Microsoft Security Blog","og_description":"The\u00a0past twelve months\u00a0have been a remarkable time of digital transformation as organizations, and especially digital security teams,\u00a0adapt to working remotely and shifting business operations.\u00a0IT leaders everywhere\u00a0turned to Zero Trust approaches to alleviate the challenges of enabling and securing remote work. Using Zero Trust to secure users, data, and devices (wherever they may be) has changed […]","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/","og_site_name":"Microsoft Security Blog","article_published_time":"2021-01-19T17:00:19+00:00","article_modified_time":"2023-05-16T06:03:08+00:00","og_image":[{"width":1024,"height":682,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1-1024x682.jpg","type":"image\/jpeg"}],"author":"Nupur Goyal","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg","twitter_misc":{"Written by":"Nupur Goyal","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/nupur-goyal\/","@type":"Person","@name":"Nupur Goyal"}],"headline":"How IT leaders are securing identities with Zero Trust","datePublished":"2021-01-19T17:00:19+00:00","dateModified":"2023-05-16T06:03:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/"},"wordCount":343,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg","keywords":["Microsoft Security Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/","name":"How IT leaders are securing identities with Zero Trust | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg","datePublished":"2021-01-19T17:00:19+00:00","dateModified":"2023-05-16T06:03:08+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/MSC17_dataCenter_055-1.jpg","width":2000,"height":1333,"caption":"MSC17_dataCenter Microsoft Contact: Stephen Smith (stepsmit) Agency: Cinco Design Agency Contact: Kate Callahan (kate@cincodesign.com) Photographer: Amy Sacka (http:\/\/www.amysackaphotography.com\/) Shoot month: March 2017 Location: Portland, OR Business: LinkedIn Datacenter"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"How IT leaders are securing identities with Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/92521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=92521"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/92521\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/92523"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=92521"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=92521"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=92521"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=92521"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=92521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=92521"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=92521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}