{"id":1013,"date":"2019-10-22T18:51:41","date_gmt":"2019-10-22T18:51:41","guid":{"rendered":"https:\/\/www.letscloud.io\/blog\/?p=1013"},"modified":"2019-10-24T16:09:34","modified_gmt":"2019-10-24T16:09:34","slug":"ci-cd-safer-discover-it-with-continuous-application-security","status":"publish","type":"post","link":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/","title":{"rendered":"CI\/CD safer? Discover it with Continuous Application Security"},"content":{"rendered":"\n<p>How to make sure your applications are safer knowing that vulnerabilities still the same 33 since 2003? The solution already exists and it\u2019s quite simple. Discover now the key concepts of Continuous Application Security and make your business better.<\/p>\n\n\n\n<p>It\u2019s a trend around the world see development companies investing in security for their<br> products. Most of all fintechs, they are majority to make applications and websites safer.<\/p>\n\n\n\n<p>The update to improve this safety has always been a concern because it needs to happen<br> close of real-time or it\u2019s valueless.<\/p>\n\n\n\n<p> And it can be worse, around 72 percent of developers say safety slows down DevOps,<br> used collaboratively to develop, test and deliver softwares easier.<\/p>\n\n\n\n<p><strong><a href=\"http:\/\/45.42.162.214\/devops-  what-are-the-most-used-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"DevOps: What Are The Most Used Tools? (opens in a new tab)\">DevOps: What Are The Most Used Tools?<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"> Why Continuous Application Security?<\/h2>\n\n\n\n<p>Develop safety focused in applications is an ordinary practice in the market, but it still<br> using old concepts since this kind of development started.<\/p>\n\n\n\n<p> The applications represent a significant number of low security, and regarding fintechs,<br> affect they market value.<\/p>\n\n\n\n<p>From this point of view, most of IT companies started to value who can develop, test or<br> assure safe in this applications the closest to a real-time update and integrating to the<br> pipeline.<\/p>\n\n\n\n<p>Today, 83 percent vulnerabilities found in the web, needs developer make changes in the<br> code to solve them, something really expansive for the companies.<\/p>\n\n\n\n<p>Comparing, 18 percent of web applications of personal data may lose it control and let they leak, like we saw in previous well known cases.<\/p>\n\n\n\n<p>Discover now the 7 keys-concepts of Continuous Application Security made to assure<br> safety in the automation, in real time and scalability for developer of your business.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Continuous<\/h2>\n\n\n\n<p> In the CAS, attacks and vulnerabilities are reported immediately instead of waiting for the annual scan. The companies must be ready to improve their defenses because recode is more expensive.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Instrumentation<\/h2>\n\n\n\n<p>The safe way to solve whats is missing without recode, retest or redeploy. Instrumentation is what add capacity to identify vulnerabilities in real time, block attacks, analyze libraries, provide a detailed report and enable a centralized policy of control and command.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IAST<\/h2>\n\n\n\n<p>Interactive Application Security Testing is an evaluation technology that uses Instrumentation to detect vulnerabilities as long the applications runs. It is simple and<br> better than DAST and SAST, offering accuracy e cover.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real-time Security Feedback<\/h2>\n\n\n\n<p>It reduces costs eliminating vulnerabilities in real-time as an ordinary part of developing.<br> Attacks are neutralized before begun. So, less cost with documentation, triage, score,<br> tracking and risk tests.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">RASP<\/h2>\n\n\n\n<p>Runtime Application Self-Protection is a defense technology that uses Instrumentation to assure blocks and defense of attacks as long the application runs. More accurate and<br> easy to deploy than WAF or other external protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security<\/h2>\n\n\n\n<p>In the CAS security is like trust in the businesses. Security is assure defenses are where<br> they should, combating e blocking any vulnerability. Known or not attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sensor<\/h2>\n\n\n\n<p>This setup analyzes the codes of the vulnerabilities. Sensor is what create basis for IAST<br> and RASP work as it should. It\u2019s operate on components, architecture or backend<br> connections.<\/p>\n\n\n\n<p> Work as developer demands we never stop to study and learn what can assure the future<br> and make it safe from malicious developers in order to profit from exploiting web<br> application vulnerabilities.<\/p>\n\n\n\n<p> Click <a href=\"https:\/\/cdn2.hubspot.net\/hubfs\/203759\/DocumentsPDF\/TheContinuousAppSecHandbook.pdf\"><strong>here<\/strong><\/a> to meet CAS documentation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to make sure your applications are safer knowing that vulnerabilities still the same 33 since 2003? The solution already exists and it\u2019s quite simple. Discover now the key concepts of Continuous Application Security and make your business better. It\u2019s a trend around the world see development companies investing in security for their products. Most &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;CI\/CD safer? Discover it with Continuous Application Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":1022,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-community","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CI\/CD safer? Discover it with Continuous Application Security<\/title>\n<meta name=\"description\" content=\"Vulnerabilities in web applications still the same 33 since 2003. So, discover the key concepts of Continuous Application Security and make it better.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CI\/CD safer? Discover it with Continuous Application Security\" \/>\n<meta property=\"og:description\" content=\"Vulnerabilities in web applications still the same 33 since 2003. So, discover the key concepts of Continuous Application Security and make it better.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/\" \/>\n<meta property=\"og:site_name\" content=\"LetsCloud Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LetsCloudOfficial\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-22T18:51:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-24T16:09:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.letscloud.io\/blog\/wp-content\/uploads\/2019\/10\/continuous-application-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laura Vick\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@letscloudInc\" \/>\n<meta name=\"twitter:site\" content=\"@letscloudInc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura Vick\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/\"},\"author\":{\"name\":\"Laura Vick\",\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/#\\\/schema\\\/person\\\/7ccd4ae516cfa4b7a98868308f061a1a\"},\"headline\":\"CI\\\/CD safer? Discover it with Continuous Application Security\",\"datePublished\":\"2019-10-22T18:51:41+00:00\",\"dateModified\":\"2019-10-24T16:09:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/\"},\"wordCount\":548,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/continuous-application-security.jpg\",\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/\",\"url\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/\",\"name\":\"CI\\\/CD safer? Discover it with Continuous Application Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/continuous-application-security.jpg\",\"datePublished\":\"2019-10-22T18:51:41+00:00\",\"dateModified\":\"2019-10-24T16:09:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/#\\\/schema\\\/person\\\/7ccd4ae516cfa4b7a98868308f061a1a\"},\"description\":\"Vulnerabilities in web applications still the same 33 since 2003. So, discover the key concepts of Continuous Application Security and make it better.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/continuous-application-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/continuous-application-security.jpg\",\"width\":880,\"height\":400,\"caption\":\"phone with apps coming out of the screen accompanied by a lock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/ci-cd-safer-discover-it-with-continuous-application-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CI\\\/CD safer? Discover it with Continuous Application Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/\",\"name\":\"LetsCloud Blog\",\"description\":\"Everything you need. Nothing you don\u2019t.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/#\\\/schema\\\/person\\\/7ccd4ae516cfa4b7a98868308f061a1a\",\"name\":\"Laura Vick\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962d94cc35dd2df7feb3bcb890cb3bafa3c7af18cde3657e83448d16473f87c6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962d94cc35dd2df7feb3bcb890cb3bafa3c7af18cde3657e83448d16473f87c6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962d94cc35dd2df7feb3bcb890cb3bafa3c7af18cde3657e83448d16473f87c6?s=96&d=mm&r=g\",\"caption\":\"Laura Vick\"},\"sameAs\":[\"https:\\\/\\\/www.letscloud.io\\\/\"],\"url\":\"https:\\\/\\\/www.letscloud.io\\\/blog\\\/author\\\/lauravick\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CI\/CD safer? Discover it with Continuous Application Security","description":"Vulnerabilities in web applications still the same 33 since 2003. So, discover the key concepts of Continuous Application Security and make it better.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/","og_locale":"en_US","og_type":"article","og_title":"CI\/CD safer? Discover it with Continuous Application Security","og_description":"Vulnerabilities in web applications still the same 33 since 2003. So, discover the key concepts of Continuous Application Security and make it better.","og_url":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/","og_site_name":"LetsCloud Blog","article_publisher":"https:\/\/www.facebook.com\/LetsCloudOfficial","article_published_time":"2019-10-22T18:51:41+00:00","article_modified_time":"2019-10-24T16:09:34+00:00","og_image":[{"width":880,"height":400,"url":"https:\/\/www.letscloud.io\/blog\/wp-content\/uploads\/2019\/10\/continuous-application-security.jpg","type":"image\/jpeg"}],"author":"Laura Vick","twitter_card":"summary_large_image","twitter_creator":"@letscloudInc","twitter_site":"@letscloudInc","twitter_misc":{"Written by":"Laura Vick","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/#article","isPartOf":{"@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/"},"author":{"name":"Laura Vick","@id":"https:\/\/www.letscloud.io\/blog\/#\/schema\/person\/7ccd4ae516cfa4b7a98868308f061a1a"},"headline":"CI\/CD safer? Discover it with Continuous Application Security","datePublished":"2019-10-22T18:51:41+00:00","dateModified":"2019-10-24T16:09:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/"},"wordCount":548,"commentCount":0,"image":{"@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.letscloud.io\/blog\/wp-content\/uploads\/2019\/10\/continuous-application-security.jpg","articleSection":["Community"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/","url":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/","name":"CI\/CD safer? Discover it with Continuous Application Security","isPartOf":{"@id":"https:\/\/www.letscloud.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/#primaryimage"},"image":{"@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.letscloud.io\/blog\/wp-content\/uploads\/2019\/10\/continuous-application-security.jpg","datePublished":"2019-10-22T18:51:41+00:00","dateModified":"2019-10-24T16:09:34+00:00","author":{"@id":"https:\/\/www.letscloud.io\/blog\/#\/schema\/person\/7ccd4ae516cfa4b7a98868308f061a1a"},"description":"Vulnerabilities in web applications still the same 33 since 2003. So, discover the key concepts of Continuous Application Security and make it better.","breadcrumb":{"@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/#primaryimage","url":"https:\/\/www.letscloud.io\/blog\/wp-content\/uploads\/2019\/10\/continuous-application-security.jpg","contentUrl":"https:\/\/www.letscloud.io\/blog\/wp-content\/uploads\/2019\/10\/continuous-application-security.jpg","width":880,"height":400,"caption":"phone with apps coming out of the screen accompanied by a lock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.letscloud.io\/blog\/ci-cd-safer-discover-it-with-continuous-application-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.letscloud.io\/blog\/"},{"@type":"ListItem","position":2,"name":"CI\/CD safer? Discover it with Continuous Application Security"}]},{"@type":"WebSite","@id":"https:\/\/www.letscloud.io\/blog\/#website","url":"https:\/\/www.letscloud.io\/blog\/","name":"LetsCloud Blog","description":"Everything you need. Nothing you don\u2019t.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.letscloud.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.letscloud.io\/blog\/#\/schema\/person\/7ccd4ae516cfa4b7a98868308f061a1a","name":"Laura Vick","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/962d94cc35dd2df7feb3bcb890cb3bafa3c7af18cde3657e83448d16473f87c6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/962d94cc35dd2df7feb3bcb890cb3bafa3c7af18cde3657e83448d16473f87c6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/962d94cc35dd2df7feb3bcb890cb3bafa3c7af18cde3657e83448d16473f87c6?s=96&d=mm&r=g","caption":"Laura Vick"},"sameAs":["https:\/\/www.letscloud.io\/"],"url":"https:\/\/www.letscloud.io\/blog\/author\/lauravick\/"}]}},"_links":{"self":[{"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/posts\/1013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/comments?post=1013"}],"version-history":[{"count":0,"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/posts\/1013\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/media\/1022"}],"wp:attachment":[{"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/media?parent=1013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/categories?post=1013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.letscloud.io\/blog\/wp-json\/wp\/v2\/tags?post=1013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}