{"id":58765,"date":"2020-01-28T03:00:06","date_gmt":"2020-01-28T11:00:06","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=58765"},"modified":"2020-06-16T12:48:55","modified_gmt":"2020-06-16T19:48:55","slug":"5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/","title":{"rendered":"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management"},"content":{"rendered":"<p>In the 21<sup>st<\/sup> century, water and wastewater management companies, much like <a href=\"\/company\/blog\/enhancing-ics-cybersecurity-simplifying-nerc-cip-compliance-for-electric-utilities\/\">electric utilities,<\/a> have become more dependent on IP-connected devices to operate efficiently. Water and wastewater utilities rely on many of <a href=\"https:\/\/www.eenews.net\/stories\/1060131769\">the same equipment providers<\/a> as electric power companies, and are therefore subject to similar cyberthreats. Because of this, many water and wastewater utilities are under increased scrutiny.<\/p>\n<p>Some of the challenges faced by water and wastewater management today include: <\/p>\n<ul>\n<li>More stringent cybersecurity standards and regulations, like <a href=\"\/company\/blog\/conducting-risk-resilience-assessments-and-erps-to-comply-with-america-s-water-infrastructure-act-awia\/\">America&rsquo;s Water Infrastructure Act of 2018<\/a>.<\/li>\n<li>Increased automation and connectivity in industrial control systems (ICS), leaving them more vulnerable than ever to cyber and operational threats.\n<li>Heightened geo-political tensions and recent <a href=\"https:\/\/www.governing.com\/columns\/tech-talk\/gov-water-utilities-cybersecurity-hackers.html\">cyber espionage from state-sponsored malicious actors<\/a>, potentially leading to an uptick in cyberattacks and intrusion attempts.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><strong>5 Questions Water and Wastewater Companies Must Answer<\/strong><\/h2>\n<p>Water management companies must ensure that every part of their daily operations is closely monitored, since failures at one point create a domino effect, potentially endangering the water supply. Only safe infrastructure can provide clean, healthy water &ndash; so it&rsquo;s really important to know the answer to these questions: <\/p>\n<ol>\n<li>What are our assets and where do they sit on the network?<\/li>\n<li>Which ones are controlled manually, and which ones are automated?<\/li>\n<li>Which assets are connected to the internet and can be controlled remotely?<\/li>\n<li>Where do the vulnerabilities in the system lie?<\/li>\n<li>How could a malicious actor use these vulnerabilities to enter and disrupt operations?<\/li>\n<\/ol>\n<p>Cybersecurity standards for water and wastewater companies are also getting stricter. To comply, ICS networks must be continuously monitored and undergo periodic <a href=\"\/company\/blog\/the-right-security-framework-can-help-you-simplify-your-risk-planning-a-simple-3-step-guide-to-determining-your-risk-score-one-technical-control-at-a-time\/\">risk assessments<\/a> to stay on top of their cybersecurity game.<\/p>\n<h2><strong>What Should Water and Wastewater Companies Do Now?<\/strong><\/h2>\n<p>To answer these 5 questions, water and wastewater companies can deploy a comprehensive OT network monitoring solution. By automatically creating and monitoring an asset inventory, these tools not only answer the questions above, but also help streamline compliance with regulatory standards. Some of the benefits of network monitoring include: <\/p>\n<ul>\n<li>Reduced asset inventory costs by automating the process of creating and maintaining one.<\/li>\n<li><a href=\"\/company\/blog\/automating-cybersecurity-and-operational-risk-analysis-for-ot-networks\/\">Reduced workload<\/a> for both cybersecurity and operations teams.<\/li>\n<li>Improved overall security of operations, especially if combined with <a href=\"\/company\/blog\/the-evolution-from-network-access-control-to-network-segmentation\/\">network segmentation efforts<\/a>.<\/li>\n<\/ul>\n<p>These solutions can also analyze the flow of changes to the system to help ensure alignment with required regulatory documentation. The data captured by them can also help with implementing network policies to prevent unauthorized and\/or dangerous behaviors, monitoring the system for scheduled and unscheduled maintenance, validating operational processes, and controlling policy execution.<\/p>\n<p>To learn more about how one national water management company answered these questions and streamlined their regulatory compliance efforts by implementing OT network monitoring, read this case study.<\/p>\n<p><center><a href=\"\/company\/resources\/water-management-company\/\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-cta2.jpg\"><\/a> <\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the 21st century, water and wastewater management companies, much like electric utilities, have become more dependent on IP-connected devices to operate efficiently. Water and wastewater utilities rely on many of the same equipment providers as electric power companies, and are therefore subject to similar cyberthreats. Because of this, many water and wastewater utilities are [&hellip;]<\/p>\n","protected":false},"author":127,"featured_media":58766,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[569],"class_list":["post-58765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management - Forescout<\/title>\n<meta name=\"description\" content=\"Five questions that water and wastewater management companies should answer to improve their cybersecurity and help streamline regulatory compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management - Forescout\" \/>\n<meta property=\"og:description\" content=\"Five questions that water and wastewater management companies should answer to improve their cybersecurity and help streamline regulatory compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-28T11:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-16T19:48:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sandeep Lota\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/\"},\"author\":{\"name\":\"Sandeep Lota\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/ffa680e5fcbc1ea5c674709fa969bfb5\"},\"headline\":\"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management\",\"datePublished\":\"2020-01-28T11:00:06+00:00\",\"dateModified\":\"2020-06-16T19:48:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/\"},\"wordCount\":452,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/\",\"name\":\"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg\",\"datePublished\":\"2020-01-28T11:00:06+00:00\",\"dateModified\":\"2020-06-16T19:48:55+00:00\",\"description\":\"Five questions that water and wastewater management companies should answer to improve their cybersecurity and help streamline regulatory compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg\",\"width\":1024,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/ffa680e5fcbc1ea5c674709fa969bfb5\",\"name\":\"Sandeep Lota\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/c43152dbc1e10505d54de470a41167bb\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd54a3968d607cba8a90cc65fdafc48f3b83b0094160bbab2a3174a844ef20de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd54a3968d607cba8a90cc65fdafc48f3b83b0094160bbab2a3174a844ef20de?s=96&d=mm&r=g\",\"caption\":\"Sandeep Lota\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management - Forescout","description":"Five questions that water and wastewater management companies should answer to improve their cybersecurity and help streamline regulatory compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/","og_locale":"en_US","og_type":"article","og_title":"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management - Forescout","og_description":"Five questions that water and wastewater management companies should answer to improve their cybersecurity and help streamline regulatory compliance.","og_url":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2020-01-28T11:00:06+00:00","article_modified_time":"2020-06-16T19:48:55+00:00","og_image":[{"width":1024,"height":560,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg","type":"image\/jpeg"}],"author":"Sandeep Lota","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/"},"author":{"name":"Sandeep Lota","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/ffa680e5fcbc1ea5c674709fa969bfb5"},"headline":"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management","datePublished":"2020-01-28T11:00:06+00:00","dateModified":"2020-06-16T19:48:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/"},"wordCount":452,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/","url":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/","name":"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg","datePublished":"2020-01-28T11:00:06+00:00","dateModified":"2020-06-16T19:48:55+00:00","description":"Five questions that water and wastewater management companies should answer to improve their cybersecurity and help streamline regulatory compliance.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg","width":1024,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/5-questions-to-answer-to-improve-cybersecurity-in-water-wastewater-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"5 Questions to Answer to Improve Cybersecurity in Water and Wastewater Management"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/ffa680e5fcbc1ea5c674709fa969bfb5","name":"Sandeep Lota","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/c43152dbc1e10505d54de470a41167bb","url":"https:\/\/secure.gravatar.com\/avatar\/cd54a3968d607cba8a90cc65fdafc48f3b83b0094160bbab2a3174a844ef20de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd54a3968d607cba8a90cc65fdafc48f3b83b0094160bbab2a3174a844ef20de?s=96&d=mm&r=g","caption":"Sandeep Lota"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/5-questions-to-answer-to-improve-cybersecurity-in-water-and-wastewater-management-blog.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/58765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/127"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=58765"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/58765\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/58766"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=58765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=58765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=58765"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=58765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}