{"id":120435,"date":"2026-05-13T13:47:42","date_gmt":"2026-05-13T06:47:42","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=120435"},"modified":"2026-05-13T13:47:42","modified_gmt":"2026-05-13T06:47:42","slug":"data-first-ai-security-strategy-becomes-critical-in-2026","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/de\/data-first-ai-security-strategy-becomes-critical-in-2026\/","title":{"rendered":"Data-first AI security strategy becomes critical in 2026"},"content":{"rendered":"<p>As AI adoption accelerates across APAC, cybersecurity leaders warn that governance frameworks are struggling to keep pace. As autonomous systems gain deeper enterprise access, a data-first AI security strategy is becoming essential.\u00a0Andy Zollo of Thales has identified limited visibility into enterprise data and weak governance as the biggest risk for 2026.\u00a0Meanwhile, seven in ten APAC organizations now cite AI as their top data security concern, while credential theft remains the leading cloud attack vector.<\/p>\n<p><span data-contrast=\"auto\">The\u00a0rise of agentic AI intensifies the challenge. Unlike traditional tools, autonomous AI systems can authenticate, access enterprise data, and make decisions at machine speed. If\u00a0organisations\u00a0have not clearly defined what data AI systems can access,\u00a0retain, or share, those decisions may be made implicitly through system\u00a0behaviour, creating avoidable compliance and exposure risks.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A strong AI security strategy begins with data classification.\u00a0Organisations\u00a0can secure AI workloads only if they know what data they hold and how sensitive it is. Identity governance is equally critical, with AI systems requiring least-privilege access controls, authentication oversight, and audit trails\u00a0similar to\u00a0human users. Encryption also\u00a0remains\u00a0a major weakness, with\u00a0nearly half\u00a0of sensitive cloud data in APAC still unencrypted.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Agentic AI also raises the stakes for cyber\u00a0defence. AI-powered attackers can automate credential theft, intelligence gathering, and adaptive attacks at scale. For enterprises, that means traditional perimeter-based security models are no longer sufficient.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The strategic takeaway is clear: businesses must treat AI security as a data governance challenge, not simply a tooling problem.\u00a0Organisations\u00a0that\u00a0establish\u00a0visibility, identity control, encryption, and AI governance early will scale AI more safely and with greater confidence. Those who delay may face incidents that force action under far less\u00a0favourable\u00a0conditions.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Quelle:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.itnews.asia\/news\/a-data-first-ai-strategy-is-critical-to-managing-security-threats-in-2026-625777\"><span data-contrast=\"none\">https:\/\/www.itnews.asia\/news\/a-data-first-ai-strategy-is-critical-to-managing-security-threats-in-2026-625777<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>As AI adoption accelerates across APAC, cybersecurity leaders warn that governance frameworks are struggling to keep pace. As autonomous systems gain deeper enterprise access, a data-first AI security strategy is becoming essential.\u00a0Andy Zollo of Thales has identified limited visibility into enterprise data and weak governance as the biggest risk for 2026.\u00a0Meanwhile, seven in ten APAC [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":120437,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1488],"class_list":["post-120435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data-first AI security strategy becomes critical in 2026 - Eastgate Software<\/title>\n<meta name=\"description\" content=\"AI security risks in APAC are rising as organisations adopt autonomous systems without governance, visibility, or strong data controls.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data-first AI security strategy becomes critical in 2026\" \/>\n<meta property=\"og:description\" content=\"AI security risks in APAC are rising as organisations adopt autonomous systems without governance, visibility, or strong data controls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/de\/data-first-ai-security-strategy-becomes-critical-in-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-13T06:47:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/05\/EGS-news-website-1366-x-768px-9.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"Data-first AI security strategy becomes critical in 2026\",\"datePublished\":\"2026-05-13T06:47:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/\"},\"wordCount\":298,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/EGS-news-website-1366-x-768px-9.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"Ai\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/\",\"name\":\"Data-first AI security strategy becomes critical in 2026 - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/EGS-news-website-1366-x-768px-9.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2026-05-13T06:47:42+00:00\",\"description\":\"AI security risks in APAC are rising as organisations adopt autonomous systems without governance, visibility, or strong data controls.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/EGS-news-website-1366-x-768px-9.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/EGS-news-website-1366-x-768px-9.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"Data-first AI security strategy becomes critical in 2026\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/data-first-ai-security-strategy-becomes-critical-in-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data-first AI security strategy becomes critical in 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/de\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data-first AI security strategy becomes critical in 2026 - Eastgate Software","description":"AI security risks in APAC are rising as organisations adopt autonomous systems without governance, visibility, or strong data controls.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Data-first AI security strategy becomes critical in 2026","og_description":"AI security risks in APAC are rising as organisations adopt autonomous systems without governance, visibility, or strong data controls.","og_url":"https:\/\/wp.eastgate-software.com\/de\/data-first-ai-security-strategy-becomes-critical-in-2026\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2026-05-13T06:47:42+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/05\/EGS-news-website-1366-x-768px-9.webp","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"Verfasst von":"huongnguyen253","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"Data-first AI security strategy becomes critical in 2026","datePublished":"2026-05-13T06:47:42+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/"},"wordCount":298,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/05\/EGS-news-website-1366-x-768px-9.webp?fit=1366%2C768&ssl=1","keywords":["Ai"],"articleSection":["Tech Enthusiast"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/","url":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/","name":"Data-first AI security strategy becomes critical in 2026 - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/05\/EGS-news-website-1366-x-768px-9.webp?fit=1366%2C768&ssl=1","datePublished":"2026-05-13T06:47:42+00:00","description":"AI security risks in APAC are rising as organisations adopt autonomous systems without governance, visibility, or strong data controls.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/05\/EGS-news-website-1366-x-768px-9.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/05\/EGS-news-website-1366-x-768px-9.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"Data-first AI security strategy becomes critical in 2026"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/data-first-ai-security-strategy-becomes-critical-in-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"Data-first AI security strategy becomes critical in 2026"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"Strategischer Partner eines globalen Fortune-500-Unternehmens","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"huongnguyen253","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/de\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/05\/EGS-news-website-1366-x-768px-9.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-vkv","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/120435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/comments?post=120435"}],"version-history":[{"count":3,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/120435\/revisions"}],"predecessor-version":[{"id":120439,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/120435\/revisions\/120439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media\/120437"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media?parent=120435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/categories?post=120435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/tags?post=120435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}