{"id":596,"date":"2016-02-13T14:53:00","date_gmt":"2016-02-13T14:53:00","guid":{"rendered":"https:\/\/staging.binaryconfidence.com\/?p=596"},"modified":"2025-08-06T11:30:39","modified_gmt":"2025-08-06T11:30:39","slug":"ochrana-koncovych-zariadeni","status":"publish","type":"post","link":"https:\/\/www.binaryconfidence.com\/en\/ochrana-koncovych-zariadeni\/","title":{"rendered":"End Point Protection"},"content":{"rendered":"<p><strong>This is how we protect you and your data.<\/strong> A well known fact about leaks of sensitive data is that the majority of such malicious activities are led by internal employees. This often includes hacking and system compromises, but the most critical is data theft.<\/p>\r\n\r\n\r\n\r\n<p>Binary Confidence monitors and defends full customer perimeter into depth. To enhance the protection of customer data against internal frauds, Binary Confidence is proud to announce the new <strong>End Point Protection<\/strong>, service <strong>that is being connected<\/strong>, ktor\u00e1 je pripojen\u00e1 k n\u00e1\u0161mu <a href=\"https:\/\/www.binaryconfidence.com\/en\/socaas\/\" target=\"_blank\" rel=\"noopener\">24\/7 monitoring center.<\/a>.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n<p>Imagine that Binary Confidence operator will call you and inform you that your engineer accessed your banking data or any other private data without your permission.<\/p>\r\n<p>Agents that are installed on desktops work in a stealth mode and still is monitoring the movement of all important documents. All the paths of manipulation, including physical USB sticks or web browsers, are carefully traced and can raise alerts based on the defined policy.<\/p>\r\n<p>As people store more and more sensitive data on servers and clouds that are often poorly guarded, we need to increase steadily the level of their protection. There are new ways of information leaks emerging permanently. Our job is to keep up and never miss out on any of these ways so we can successfully avoid them.<\/p>\r\n<p>If you want to know more about our product, <a href=\"https:\/\/www.binaryconfidence.com\/en\/kontakt\/\">CONTACT US<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Takto chr\u00e1nime v\u00e1s a va\u0161e d\u00e1ta. O \u00fanikoch citliv\u00fdch \u00fadajov je zn\u00e1me, \u017ee vo v\u00e4\u010d\u0161ine pr\u00edpadov s\u00fa za ne zodpovedn\u00ed intern\u00ed zamestnanci. \u010casto ide o\u00a0hackovanie a\u00a0naru\u0161enie syst\u00e9mov, ale najkritickej\u0161ia je kr\u00e1de\u017e d\u00e1t. Binary Confidence monitoruje a\u00a0chr\u00e1ni cel\u00fa z\u00e1kazn\u00edcku vrstvu do h\u013abky. Aby sa zv\u00fd\u0161ila ochrana d\u00e1t z\u00e1kazn\u00edkov pred podvodn\u00fdmi aktivitami z intern\u00e9ho prostredia, spolo\u010dnos\u0165 Binary [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9099,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[23],"tags":[],"class_list":["post-596","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-monitorovanie-bezpecnosti"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>End Point Protection: Monitorovanie intern\u00fdch hrozieb<\/title>\n<meta name=\"description\" content=\"O \u00fanikoch citliv\u00fdch \u00fadajov je zn\u00e1me, \u017ee vo v\u00e4\u010d\u0161ine pr\u00edpadov s\u00fa za ne zodpovedn\u00ed intern\u00ed zamestnanci. \u010casto ide o\u00a0hackovanie a\u00a0naru\u0161enie syst\u00e9mov, ale najkritickej\u0161ia je kr\u00e1de\u017e d\u00e1t.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.binaryconfidence.com\/en\/ochrana-koncovych-zariadeni\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"End Point Protection: Monitorovanie intern\u00fdch hrozieb\" \/>\n<meta property=\"og:description\" content=\"O \u00fanikoch citliv\u00fdch \u00fadajov je zn\u00e1me, \u017ee vo v\u00e4\u010d\u0161ine pr\u00edpadov s\u00fa za ne zodpovedn\u00ed intern\u00ed zamestnanci. \u010casto ide o\u00a0hackovanie a\u00a0naru\u0161enie syst\u00e9mov, ale najkritickej\u0161ia je kr\u00e1de\u017e d\u00e1t.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.binaryconfidence.com\/en\/ochrana-koncovych-zariadeni\/\" \/>\n<meta property=\"og:site_name\" content=\"Binary Confidence\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BinConf\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-13T14:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T11:30:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/stock-market-graph-financial-data-on-an-electroni.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1181\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"root\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:site\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"root\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/\"},\"author\":{\"name\":\"root\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\"},\"headline\":\"Ochrana koncov\u00fdch zariaden\u00ed\",\"datePublished\":\"2016-02-13T14:53:00+00:00\",\"dateModified\":\"2025-08-06T11:30:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/\"},\"wordCount\":304,\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/stock-market-graph-financial-data-on-an-electroni.webp\",\"articleSection\":[\"Monitorovanie bezpe\u010dnosti\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/\",\"name\":\"End Point Protection: Monitorovanie intern\u00fdch hrozieb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/stock-market-graph-financial-data-on-an-electroni.webp\",\"datePublished\":\"2016-02-13T14:53:00+00:00\",\"dateModified\":\"2025-08-06T11:30:39+00:00\",\"description\":\"O \u00fanikoch citliv\u00fdch \u00fadajov je zn\u00e1me, \u017ee vo v\u00e4\u010d\u0161ine pr\u00edpadov s\u00fa za ne zodpovedn\u00ed intern\u00ed zamestnanci. \u010casto ide o\u00a0hackovanie a\u00a0naru\u0161enie syst\u00e9mov, ale najkritickej\u0161ia je kr\u00e1de\u017e d\u00e1t.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/stock-market-graph-financial-data-on-an-electroni.webp\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/stock-market-graph-financial-data-on-an-electroni.webp\",\"width\":2560,\"height\":1181,\"caption\":\"Laptop s grafmi v neonovom svetle \u2013 ilustr\u00e1cia monitorovania bezpe\u010dnosti koncov\u00fdch zariaden\u00ed\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ochrana-koncovych-zariadeni\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ochrana koncov\u00fdch zariaden\u00ed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"name\":\"Binary Confidence\",\"description\":\"Binary Confidence\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.binaryconfidence.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\",\"name\":\"Binary Confidence\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"caption\":\"Binary Confidence\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/BinConf\",\"https:\\\/\\\/x.com\\\/binaryconf\",\"https:\\\/\\\/www.youtube.com\\\/@binaryconfidence\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/binary-confidence\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\",\"name\":\"root\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"caption\":\"root\"},\"sameAs\":[\"https:\\\/\\\/www.binaryconfidence.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"End Point Protection: Internat threat monitoring","description":"A well known fact about leaks of sensitive data is that the majority of such malicious activities are led by internal employees. This often includes hacking and system compromises, but the most critical is data theft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.binaryconfidence.com\/en\/ochrana-koncovych-zariadeni\/","og_locale":"en_GB","og_type":"article","og_title":"End Point Protection: Monitorovanie intern\u00fdch hrozieb","og_description":"O \u00fanikoch citliv\u00fdch \u00fadajov je zn\u00e1me, \u017ee vo v\u00e4\u010d\u0161ine pr\u00edpadov s\u00fa za ne zodpovedn\u00ed intern\u00ed zamestnanci. \u010casto ide o\u00a0hackovanie a\u00a0naru\u0161enie syst\u00e9mov, ale najkritickej\u0161ia je kr\u00e1de\u017e d\u00e1t.","og_url":"https:\/\/www.binaryconfidence.com\/en\/ochrana-koncovych-zariadeni\/","og_site_name":"Binary Confidence","article_publisher":"https:\/\/www.facebook.com\/BinConf","article_published_time":"2016-02-13T14:53:00+00:00","article_modified_time":"2025-08-06T11:30:39+00:00","og_image":[{"width":2560,"height":1181,"url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/stock-market-graph-financial-data-on-an-electroni.webp","type":"image\/webp"}],"author":"root","twitter_card":"summary_large_image","twitter_creator":"@binaryconf","twitter_site":"@binaryconf","twitter_misc":{"Written by":"root","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/#article","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/"},"author":{"name":"root","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514"},"headline":"Ochrana koncov\u00fdch zariaden\u00ed","datePublished":"2016-02-13T14:53:00+00:00","dateModified":"2025-08-06T11:30:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/"},"wordCount":304,"publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/stock-market-graph-financial-data-on-an-electroni.webp","articleSection":["Monitorovanie bezpe\u010dnosti"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/","url":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/","name":"End Point Protection: Internat threat monitoring","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/#primaryimage"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/stock-market-graph-financial-data-on-an-electroni.webp","datePublished":"2016-02-13T14:53:00+00:00","dateModified":"2025-08-06T11:30:39+00:00","description":"A well known fact about leaks of sensitive data is that the majority of such malicious activities are led by internal employees. This often includes hacking and system compromises, but the most critical is data theft.","breadcrumb":{"@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/#primaryimage","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/stock-market-graph-financial-data-on-an-electroni.webp","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/stock-market-graph-financial-data-on-an-electroni.webp","width":2560,"height":1181,"caption":"Laptop s grafmi v neonovom svetle \u2013 ilustr\u00e1cia monitorovania bezpe\u010dnosti koncov\u00fdch zariaden\u00ed"},{"@type":"BreadcrumbList","@id":"https:\/\/www.binaryconfidence.com\/ochrana-koncovych-zariadeni\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.binaryconfidence.com\/"},{"@type":"ListItem","position":2,"name":"Ochrana koncov\u00fdch zariaden\u00ed"}]},{"@type":"WebSite","@id":"https:\/\/www.binaryconfidence.com\/#website","url":"https:\/\/www.binaryconfidence.com\/","name":"Binary Confidence","description":"Binary Confidence","publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.binaryconfidence.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.binaryconfidence.com\/#organization","name":"Binary Confidence","url":"https:\/\/www.binaryconfidence.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","caption":"Binary Confidence"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BinConf","https:\/\/x.com\/binaryconf","https:\/\/www.youtube.com\/@binaryconfidence","https:\/\/www.linkedin.com\/company\/binary-confidence\/"]},{"@type":"Person","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514","name":"root","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","caption":"root"},"sameAs":["https:\/\/www.binaryconfidence.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/comments?post=596"}],"version-history":[{"count":7,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/596\/revisions"}],"predecessor-version":[{"id":10509,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/596\/revisions\/10509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media\/9099"}],"wp:attachment":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media?parent=596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/categories?post=596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/tags?post=596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}