{"id":558,"date":"2017-11-10T14:00:00","date_gmt":"2017-11-10T14:00:00","guid":{"rendered":"https:\/\/staging.binaryconfidence.com\/?p=558"},"modified":"2025-08-06T11:37:33","modified_gmt":"2025-08-06T11:37:33","slug":"stredisko-bezpecnostnych-operacii-soc-novej-generacie","status":"publish","type":"post","link":"https:\/\/www.binaryconfidence.com\/en\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/","title":{"rendered":"Next generation of the Security Operations Center"},"content":{"rendered":"<p>We started a project called \u201cSOC-ng the next generation\u201d, aiming to contribute to the solution by limiting the core problem of human presence and their quality in the SOC.<\/p>\r\n\r\n\r\n\r\n<p>SOC is an abbreviation for <a href=\"https:\/\/www.binaryconfidence.com\/en\/socaas\/\" target=\"_blank\" rel=\"noopener\">Security Operations Center<\/a>, which is a central element in terms of security of the entire ICT environment. It is the central point where all logs and events are collected and evaluated and through which appropriate measures are taken.<\/p>\r\n\r\n\r\n\r\n<p>These logs and events received in the SOC are to be analysed by security experts. Currently, however, there is a lack of qualified security experts that can analyse and keep an eye on the behaviour of the client\u2019s environment.<\/p>\r\n\r\n\r\n\r\n<p>This problem results either from the general lack of people or from the lack of their professionality and motivation, as the work can be quite monotonous, especially when working only with one client.<\/p>\r\n\r\n\r\n\r\n<p class=\"translation-block\">Our company has solved this problem. We have mastered the processes of headhunting, training and continuous professional growth of <a href=\"https:\/\/www.binaryconfidence.com\/en\/kariera\/\" target=\"_blank\" rel=\"noopener\">security analysts<\/a>, we have improved the analysis process itself, which allows analysts to protect the client's environment much better, and since we provide services to multiple clients at the same time, this work also brings greater challenges, which makes it more interesting and attractive for our analysts.<\/p>\r\n\r\n\r\n\r\n<h2><strong>Machine learning comes to the rescue<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Based on our experience and vast data we\u2019ve been collecting, we are convinced that the weakest point, which is the human investigation, can be solved with a new technology \u2013 the machine learning approach.<\/p>\r\n\r\n\r\n\r\n<p>We believe that investigation processes, which require common sense and analytical thinking, can be taught to machine learning with better results than to humans.<\/p>\r\n\r\n\r\n\r\n<p>Therefore we started a project called \u201cSOC-ng the next generation\u201d, aiming to contribute to the solution by limiting the core problem of human presence and their quality in the SOC.<\/p>\r\n<p>Traditionally, there are several different ways of attack detection and most of them are based on the signature detection. However, attackers have adapted to this approach long time ago by using obfuscation or polymorphism to make the processes seem legitimate and avoid any detection.<\/p>\r\n\r\n\r\n\r\n<p>This results in almost 200.000 new malicious code modifications per day. To be able to detect and limit any further spread of these codes, first the attacked victims must be detected, then specialists must analyse the malicious code\/traffic and choose detection patterns and finally distribute these new patterns among defenders.<\/p>\r\n<p>This process takes a significant amount of time, which means the Zero Day vulnerabilities could have been attacking the system for days and systems without updates haven\u2019t been protected at all.<\/p>\r\n<p class=\"translation-block\">These threats are used for <strong>Advanced Persistent Threat<\/strong> (APT) attacks that are difficult to detect. <strong>Zero-day vulnerabilities<\/strong> can be found on the vast darknet, giving criminals and state actors a powerful weapon to attack another country, business, or military or strategic infrastructure.<\/p>\r\n<p>By using the machine learning and the analytical technologies, we can train the detection systems for automated and non-signature based detection and investigation of any behavioural patterns of attacks even before the exact code has been revealed and analysed. This may improve the real-time protection against not-yet-analysed codes and network attack strategies.<\/p>\r\n<p>Similarly, the machine learning systems could be trained on a particular ICT environment to recognize its standard operation. If the environment behaviour diverts from the learned pattern, operators would be immediately notified.<\/p>\r\n<p><strong>The goal is to minimalize human interaction in the SOC by replacing people with machines trained for proper investigation.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Spustili sme nov\u00fd projekt s cie\u013eom prispie\u0165 k\u00a0rie\u0161eniu k\u013e\u00fa\u010dov\u00e9ho probl\u00e9mu, ktor\u00fdm je faktor \u013eudskej pr\u00edtomnosti a\u00a0odborn\u00fdch kval\u00edt v SOC. SOC je skratkou pre Security Operations Center, t. j. stredisko bezpe\u010dnostn\u00fdch oper\u00e1ci\u00ed, ktor\u00e9 je \u00fastredn\u00fdm prvkom z h\u013eadiska bezpe\u010dnosti cel\u00e9ho IKT prostredia. Ide centr\u00e1lny bod, v ktorom sa zhroma\u017e\u010fuj\u00fa a vyhodnocuj\u00fa v\u0161etky logy a udalosti a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"class_list":["post-558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soc"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Strojov\u00e9 u\u010denie v SOC: Nov\u00fd projekt pre boj proti kyber\u00fatokom<\/title>\n<meta name=\"description\" content=\"Nov\u00fd projekt SOC vyu\u017e\u00edva strojov\u00e9 u\u010denie na zlep\u0161enie detekcie kyber\u00fatokov a zv\u00fd\u0161enie bezpe\u010dnosti. Zistite viac na na\u0161om blogu.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.binaryconfidence.com\/en\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strojov\u00e9 u\u010denie v SOC: Nov\u00fd projekt pre boj proti kyber\u00fatokom\" \/>\n<meta property=\"og:description\" content=\"Nov\u00fd projekt SOC vyu\u017e\u00edva strojov\u00e9 u\u010denie na zlep\u0161enie detekcie kyber\u00fatokov a zv\u00fd\u0161enie bezpe\u010dnosti. Zistite viac na na\u0161om blogu.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.binaryconfidence.com\/en\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/\" \/>\n<meta property=\"og:site_name\" content=\"Binary Confidence\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BinConf\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-10T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T11:37:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2017\/11\/XXXX5400-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"root\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:site\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"root\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/\"},\"author\":{\"name\":\"root\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\"},\"headline\":\"Stredisko bezpe\u010dnostn\u00fdch oper\u00e1ci\u00ed (SOC) novej gener\u00e1cie\",\"datePublished\":\"2017-11-10T14:00:00+00:00\",\"dateModified\":\"2025-08-06T11:37:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/\"},\"wordCount\":721,\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/XXXX5400-scaled.jpg\",\"articleSection\":[\"SOC\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/\",\"name\":\"Strojov\u00e9 u\u010denie v SOC: Nov\u00fd projekt pre boj proti kyber\u00fatokom\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/XXXX5400-scaled.jpg\",\"datePublished\":\"2017-11-10T14:00:00+00:00\",\"dateModified\":\"2025-08-06T11:37:33+00:00\",\"description\":\"Nov\u00fd projekt SOC vyu\u017e\u00edva strojov\u00e9 u\u010denie na zlep\u0161enie detekcie kyber\u00fatokov a zv\u00fd\u0161enie bezpe\u010dnosti. Zistite viac na na\u0161om blogu.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/XXXX5400-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/XXXX5400-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Cybersecurity specialist in front of the computer screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stredisko bezpe\u010dnostn\u00fdch oper\u00e1ci\u00ed (SOC) novej gener\u00e1cie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"name\":\"Binary Confidence\",\"description\":\"Binary Confidence\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.binaryconfidence.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\",\"name\":\"Binary Confidence\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"caption\":\"Binary Confidence\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/BinConf\",\"https:\\\/\\\/x.com\\\/binaryconf\",\"https:\\\/\\\/www.youtube.com\\\/@binaryconfidence\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/binary-confidence\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\",\"name\":\"root\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"caption\":\"root\"},\"sameAs\":[\"https:\\\/\\\/www.binaryconfidence.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Machine Learning in SOC: A New Project to Combat Cyberattacks","description":"New SOC project uses machine learning to improve cyberattack detection and security. Learn more on our blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.binaryconfidence.com\/en\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/","og_locale":"en_GB","og_type":"article","og_title":"Strojov\u00e9 u\u010denie v SOC: Nov\u00fd projekt pre boj proti kyber\u00fatokom","og_description":"Nov\u00fd projekt SOC vyu\u017e\u00edva strojov\u00e9 u\u010denie na zlep\u0161enie detekcie kyber\u00fatokov a zv\u00fd\u0161enie bezpe\u010dnosti. Zistite viac na na\u0161om blogu.","og_url":"https:\/\/www.binaryconfidence.com\/en\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/","og_site_name":"Binary Confidence","article_publisher":"https:\/\/www.facebook.com\/BinConf","article_published_time":"2017-11-10T14:00:00+00:00","article_modified_time":"2025-08-06T11:37:33+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2017\/11\/XXXX5400-scaled.jpg","type":"image\/jpeg"}],"author":"root","twitter_card":"summary_large_image","twitter_creator":"@binaryconf","twitter_site":"@binaryconf","twitter_misc":{"Written by":"root","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/#article","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/"},"author":{"name":"root","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514"},"headline":"Stredisko bezpe\u010dnostn\u00fdch oper\u00e1ci\u00ed (SOC) novej gener\u00e1cie","datePublished":"2017-11-10T14:00:00+00:00","dateModified":"2025-08-06T11:37:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/"},"wordCount":721,"publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2017\/11\/XXXX5400-scaled.jpg","articleSection":["SOC"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/","url":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/","name":"Machine Learning in SOC: A New Project to Combat Cyberattacks","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/#primaryimage"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2017\/11\/XXXX5400-scaled.jpg","datePublished":"2017-11-10T14:00:00+00:00","dateModified":"2025-08-06T11:37:33+00:00","description":"New SOC project uses machine learning to improve cyberattack detection and security. Learn more on our blog.","breadcrumb":{"@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/#primaryimage","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2017\/11\/XXXX5400-scaled.jpg","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2017\/11\/XXXX5400-scaled.jpg","width":2560,"height":1707,"caption":"Cybersecurity specialist in front of the computer screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.binaryconfidence.com\/stredisko-bezpecnostnych-operacii-soc-novej-generacie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.binaryconfidence.com\/"},{"@type":"ListItem","position":2,"name":"Stredisko bezpe\u010dnostn\u00fdch oper\u00e1ci\u00ed (SOC) novej gener\u00e1cie"}]},{"@type":"WebSite","@id":"https:\/\/www.binaryconfidence.com\/#website","url":"https:\/\/www.binaryconfidence.com\/","name":"Binary Confidence","description":"Binary Confidence","publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.binaryconfidence.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.binaryconfidence.com\/#organization","name":"Binary Confidence","url":"https:\/\/www.binaryconfidence.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","caption":"Binary Confidence"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BinConf","https:\/\/x.com\/binaryconf","https:\/\/www.youtube.com\/@binaryconfidence","https:\/\/www.linkedin.com\/company\/binary-confidence\/"]},{"@type":"Person","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514","name":"root","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","caption":"root"},"sameAs":["https:\/\/www.binaryconfidence.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/comments?post=558"}],"version-history":[{"count":7,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/558\/revisions"}],"predecessor-version":[{"id":10511,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/558\/revisions\/10511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media\/9320"}],"wp:attachment":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media?parent=558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/categories?post=558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/tags?post=558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}