{"id":1763,"date":"2024-04-12T15:14:00","date_gmt":"2024-04-12T09:44:00","guid":{"rendered":"https:\/\/techfruitspl.com\/news\/?p=1763"},"modified":"2024-04-12T15:13:52","modified_gmt":"2024-04-12T09:43:52","slug":"the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses","status":"publish","type":"post","link":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/","title":{"rendered":"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses"},"content":{"rendered":"\n<p>The ever-evolving threat landscape and the growing complexity of IT infrastructure are driving the adoption of innovative security solutions. One such solution gaining significant traction is Cybersecurity Mesh Architecture (CSMA).<\/p>\n\n\n\n<p><strong>What is Cybersecurity Mesh Architecture?<\/strong><\/p>\n\n\n\n<p>CSMA is a decentralized security approach that treats various security tools and services as interconnected nodes in a distributed network. Unlike traditional, centralized security models, CSMA offers several advantages:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Improved Scalability: Easily adapts to accommodate new security tools and devices as your business grows.<\/li>\n\n\n\n<li>Enhanced Agility: Responds rapidly to security threats by enabling dynamic communication and collaboration between different security components.<\/li>\n\n\n\n<li>Simplified Management: Provides a centralized view and control over your entire security ecosystem, reducing complexity.<\/li>\n\n\n\n<li>Greater Visibility: Offers a holistic view of potential threats across your entire IT infrastructure.<\/li>\n<\/ul>\n\n\n\n<p><strong>Impact on Businesses:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Improved Security Posture: CSMA helps businesses build a more robust and resilient security environment that can effectively address evolving threats.<\/li>\n\n\n\n<li>Reduced Costs: Eliminates the need for siloed security solutions and simplifies management, potentially lowering overall security expenses.<\/li>\n\n\n\n<li>Enhanced User Experience: Provides a more seamless and integrated security experience for users.<\/li>\n<\/ul>\n\n\n\n<p><strong>Examples of How Businesses Can Leverage CSMA:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrating endpoint security solutions with cloud security controls.<\/li>\n\n\n\n<li>Connecting firewalls from different vendors to share threat intelligence.<\/li>\n\n\n\n<li>Enabling secure communication between on-premises and cloud-based applications.<\/li>\n<\/ul>\n\n\n\n<p><strong>Techfruits: Your Partner in Cybersecurity<\/strong><\/p>\n\n\n\n<p>At Techfruits, we understand the importance of a comprehensive and adaptable security strategy. We offer a wide range of cybersecurity solutions and services, including consulting on implementing a Cybersecurity Mesh Architecture to best suit your business needs.<\/p>\n\n\n\n<p><strong>Is your current security approach keeping pace with the evolving threat landscape?<\/strong> Contact Techfruits today and discuss how CSMA can revolutionize your cybersecurity posture.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The traditional, centralized approach to cybersecurity is struggling to keep pace with the ever-expanding and increasingly sophisticated threat landscape. Businesses are turning to innovative solutions like Cybersecurity Mesh Architecture (CSMA) to build more resilient and adaptable security postures. CSMA offers a decentralized approach, treating security tools and services as interconnected nodes in a distributed network. This enables greater scalability, agility, and visibility, empowering businesses to effectively combat evolving cyber threats.<\/p>\n","protected":false},"author":2,"featured_media":1766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-1763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-insights"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses - Techfruits - IT Solutions | Services | Softwares<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses - Techfruits - IT Solutions | Services | Softwares\" \/>\n<meta property=\"og:description\" content=\"The traditional, centralized approach to cybersecurity is struggling to keep pace with the ever-expanding and increasingly sophisticated threat landscape. Businesses are turning to innovative solutions like Cybersecurity Mesh Architecture (CSMA) to build more resilient and adaptable security postures. CSMA offers a decentralized approach, treating security tools and services as interconnected nodes in a distributed network. This enables greater scalability, agility, and visibility, empowering businesses to effectively combat evolving cyber threats.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"Techfruits - IT Solutions | Services | Softwares\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-12T09:44:00+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Techfruits Insider\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Techfruits Insider\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/#article\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/\"},\"author\":{\"name\":\"Techfruits Insider\",\"@id\":\"https:\\\/\\\/techfruitspl.com\\\/news\\\/#\\\/schema\\\/person\\\/0c975ce9e4d59cde1e1607b7a0eb2543\"},\"headline\":\"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses\",\"datePublished\":\"2024-04-12T09:44:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/\"},\"wordCount\":287,\"commentCount\":0,\"image\":{\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Cybersecurity-Mesh-Architecture.jpg\",\"articleSection\":[\"Industry Insights\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/\",\"url\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/\",\"name\":\"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses - Techfruits - IT Solutions | Services | Softwares\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/techfruitspl.com\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Cybersecurity-Mesh-Architecture.jpg\",\"datePublished\":\"2024-04-12T09:44:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/techfruitspl.com\\\/news\\\/#\\\/schema\\\/person\\\/0c975ce9e4d59cde1e1607b7a0eb2543\"},\"breadcrumb\":{\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/#primaryimage\",\"url\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Cybersecurity-Mesh-Architecture.jpg\",\"contentUrl\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Cybersecurity-Mesh-Architecture.jpg\",\"width\":1024,\"height\":768,\"caption\":\"Cybersecurity Mesh Architecture.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/industry-insights\\\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/techfruitspl.com\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/techfruitspl.com\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/techfruitspl.com\\\/news\\\/\",\"name\":\"Techfruits - IT Solutions | Services | Softwares\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/techfruitspl.com\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/techfruitspl.com\\\/news\\\/#\\\/schema\\\/person\\\/0c975ce9e4d59cde1e1607b7a0eb2543\",\"name\":\"Techfruits Insider\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7a505d727f83c11b101cd9b23e3fd884013e87ef2f443f937bfa55a34fbe13a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7a505d727f83c11b101cd9b23e3fd884013e87ef2f443f937bfa55a34fbe13a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7a505d727f83c11b101cd9b23e3fd884013e87ef2f443f937bfa55a34fbe13a?s=96&d=mm&r=g\",\"caption\":\"Techfruits Insider\"},\"url\":\"http:\\\/\\\/techfruitspl.com\\\/news\\\/author\\\/techfruits-insider\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses - Techfruits - IT Solutions | Services | Softwares","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/","og_locale":"en_US","og_type":"article","og_title":"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses - Techfruits - IT Solutions | Services | Softwares","og_description":"The traditional, centralized approach to cybersecurity is struggling to keep pace with the ever-expanding and increasingly sophisticated threat landscape. Businesses are turning to innovative solutions like Cybersecurity Mesh Architecture (CSMA) to build more resilient and adaptable security postures. CSMA offers a decentralized approach, treating security tools and services as interconnected nodes in a distributed network. This enables greater scalability, agility, and visibility, empowering businesses to effectively combat evolving cyber threats.","og_url":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/","og_site_name":"Techfruits - IT Solutions | Services | Softwares","article_published_time":"2024-04-12T09:44:00+00:00","og_image":[{"width":1024,"height":768,"url":"http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg","type":"image\/jpeg"}],"author":"Techfruits Insider","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Techfruits Insider","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/#article","isPartOf":{"@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/"},"author":{"name":"Techfruits Insider","@id":"https:\/\/techfruitspl.com\/news\/#\/schema\/person\/0c975ce9e4d59cde1e1607b7a0eb2543"},"headline":"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses","datePublished":"2024-04-12T09:44:00+00:00","mainEntityOfPage":{"@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/"},"wordCount":287,"commentCount":0,"image":{"@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/#primaryimage"},"thumbnailUrl":"http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg","articleSection":["Industry Insights"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/","url":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/","name":"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses - Techfruits - IT Solutions | Services | Softwares","isPartOf":{"@id":"https:\/\/techfruitspl.com\/news\/#website"},"primaryImageOfPage":{"@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/#primaryimage"},"image":{"@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/#primaryimage"},"thumbnailUrl":"http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg","datePublished":"2024-04-12T09:44:00+00:00","author":{"@id":"https:\/\/techfruitspl.com\/news\/#\/schema\/person\/0c975ce9e4d59cde1e1607b7a0eb2543"},"breadcrumb":{"@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/#primaryimage","url":"http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg","contentUrl":"http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg","width":1024,"height":768,"caption":"Cybersecurity Mesh Architecture."},{"@type":"BreadcrumbList","@id":"http:\/\/techfruitspl.com\/news\/industry-insights\/the-rise-of-cybersecurity-mesh-architecture-and-its-impact-on-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techfruitspl.com\/news\/"},{"@type":"ListItem","position":2,"name":"The Rise of Cybersecurity Mesh Architecture and its Impact on Businesses"}]},{"@type":"WebSite","@id":"https:\/\/techfruitspl.com\/news\/#website","url":"https:\/\/techfruitspl.com\/news\/","name":"Techfruits - IT Solutions | Services | Softwares","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techfruitspl.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/techfruitspl.com\/news\/#\/schema\/person\/0c975ce9e4d59cde1e1607b7a0eb2543","name":"Techfruits Insider","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/d7a505d727f83c11b101cd9b23e3fd884013e87ef2f443f937bfa55a34fbe13a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d7a505d727f83c11b101cd9b23e3fd884013e87ef2f443f937bfa55a34fbe13a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d7a505d727f83c11b101cd9b23e3fd884013e87ef2f443f937bfa55a34fbe13a?s=96&d=mm&r=g","caption":"Techfruits Insider"},"url":"http:\/\/techfruitspl.com\/news\/author\/techfruits-insider\/"}]}},"rttpg_featured_image_url":{"full":["http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg",1024,768,false],"landscape":["http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg",1024,768,false],"portraits":["http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg",1024,768,false],"thumbnail":["http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture-150x150.jpg",150,150,true],"medium":["http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture-300x225.jpg",300,225,true],"large":["http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg",1024,768,false],"1536x1536":["http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg",1024,768,false],"2048x2048":["http:\/\/techfruitspl.com\/news\/wp-content\/uploads\/2024\/04\/Cybersecurity-Mesh-Architecture.jpg",1024,768,false]},"rttpg_author":{"display_name":"Techfruits Insider","author_link":"http:\/\/techfruitspl.com\/news\/author\/techfruits-insider\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"http:\/\/techfruitspl.com\/news\/category\/industry-insights\/\" rel=\"category tag\">Industry Insights<\/a>","rttpg_excerpt":"The traditional, centralized approach to cybersecurity is struggling to keep pace with the ever-expanding and increasingly sophisticated threat landscape. Businesses are turning to innovative solutions like Cybersecurity Mesh Architecture (CSMA) to build more resilient and adaptable security postures. CSMA offers a decentralized approach, treating security tools and services as interconnected nodes in a distributed network.&hellip;","_links":{"self":[{"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/posts\/1763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/comments?post=1763"}],"version-history":[{"count":1,"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/posts\/1763\/revisions"}],"predecessor-version":[{"id":1764,"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/posts\/1763\/revisions\/1764"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/media\/1766"}],"wp:attachment":[{"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/media?parent=1763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/categories?post=1763"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/techfruitspl.com\/news\/wp-json\/wp\/v2\/tags?post=1763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}