{"id":11511,"date":"2023-06-15T07:37:01","date_gmt":"2023-06-15T04:37:01","guid":{"rendered":"https:\/\/emiralmedia.ro\/site\/safetech_new\/safetech-cert-the-ideal-solution-for-monitoring-managing-and-reporting-cyber-security-incidents\/"},"modified":"2024-07-02T14:08:43","modified_gmt":"2024-07-02T11:08:43","slug":"safetech-cert-the-ideal-solution-for-monitoring-managing-and-reporting-cyber-security-incidents","status":"publish","type":"post","link":"https:\/\/safetech.ro\/en\/safetech-cert-the-ideal-solution-for-monitoring-managing-and-reporting-cyber-security-incidents\/","title":{"rendered":"Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11511\" class=\"elementor elementor-11511 elementor-6015\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae58051 e-flex e-con-boxed e-con e-parent\" data-id=\"ae58051\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc24f6f elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"fc24f6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9a9f38 elementor-widget elementor-widget-text-editor\" data-id=\"d9a9f38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"n2-ss-layer n2-ow n-uc-AkzhekbbKtun n2-ss-layer--auto\" data-pm=\"normal\" data-sstype=\"layer\"><h2 id=\"n2-ss-405item3\" class=\"n2-font-f117f5e670caafe088ebd1b04877341d-hover n2-ss-item-content n2-ss-text n2-ow\">Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents<\/h2><\/div><div class=\"n2-ss-layer n2-ow n-uc-QPFuVdSCftpp\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Last year, organizations in Romania faced a massive increase in the volume of IT threats, especially at the end of the year. In June, STS reported an intensification of DDoS attacks (also confirmed by the National Cyberint Center within the SRI), and in September, the IT Security Incident Response Center (CERT-INT) within the Ministry of Internal Affairs announced the identification of over 6 million of events and issuing 5,682 security alerts.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-17541738cf74d\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">The situation becomes more complicated if we take into account the lack of cybersecurity specialists, which the National Cyber Security Directorate estimates at about 2,500-3,000 people, but also the adoption of very strict regulations, such as the NIS 1 Directive transposed into law 362\/2018, or the more recent ones &#8211; the NIS 2 Directive or DORA (Digital Operational Resilience Act). This context is driving more and more organizations to look for solutions for monitoring, managing and reporting cyber security incidents.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-14f3f1717476d\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><h4 class=\"n2-font-ab444ba538caf7a67c68dfe1757411d5-paragraph \"><b>It&#8217;s time for CERT<\/b><\/h4><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-17fbf268b82be\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Currently, the most used method to deal with these needs is the use of a CERT (Computer Emergency Response Team) or CSIRT (Computer Security Incident Response Team), to cover the entire spectrum of necessary services, from monitoring, detection and analysis, to remediation and reporting.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-10ffad47ef5fb\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">A CERT is generally responsible for identifying, analyzing, and mitigating cyber threats and vulnerabilities, as well as providing recommendations to prevent future incidents. The importance of such a team is that it provides a coordinated and efficient way to respond to cyber incidents, which can help minimize the damage and disruption caused by such incidents.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1908ac7c19e1a\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Additionally, a licensed CERT has specialized expertise and resources that can be used to quickly and efficiently address the technical and logistical aspects of a cyber incident. CERTs also collaborate with other similar entities (public or private) which contributes to the fluency of communication and information exchange in the event of a cyber incident.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1ca2efcaabd41\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">In Romania, Safetech Innovations owns a private CERT established since 2015 (called STI CERT\u00ae), which includes a team of more than 25 certified experts on multiple leading technologies. STI CERT is accredited by Trusted Introducer &#8211; the European Community of Computer Emergency Response Team Organizations (<a tabindex=\"0\" href=\"https:\/\/www.trusted-introducer.org\/\" target=\"_blank\" rel=\"noopener\">www.trusted-introducer.org<\/a>).<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-16eed1a9d42b2\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">STI CERT differentiates itself from other providers through its three-level support structure (detection, response, advanced support), and its capabilities are complemented by the extensive expertise of the other technical teams within Safetech, which provide complementary, preventive services covering the areas of consulting for governance, systems integration, penetration testing, vulnerability management and security auditing.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1cc4085253702\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><h4 class=\"n2-font-ab444ba538caf7a67c68dfe1757411d5-paragraph \"><b>Is creating your own CERT justified?<\/b><\/h4><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-128a3f1141c7f\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Creating and operating a CERT are complex and expensive processes. These require advanced skills and specialized human resources, a CERT being staffed by security analysts with advanced expertise in using various security solutions and identifying the most important types of cyber attacks. However, according to the statements of the National Cyber Security Directorate (at the CIO Council 2022 Conference), at the end of last year, Romania registered a deficit of around 2,500-3,000 specialists in the field of IT security, a deficit that will continue to grow. The situation is similar at the global level, with the recorded minus exceeding 3.4 million cybersecurity specialists ( according to Cybersecurity study data Workforce 2022\u00a0<a tabindex=\"0\" href=\"https:\/\/www.isc2.org\/Research\/Workforce-Study\" target=\"_blank\" rel=\"noopener\">https:\/\/www.isc2.org\/Research\/Workforce-Study<\/a>\u00a0).<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1d1f2946a2324\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Also, the actual operation of a CERT is not cheap &#8211; according to data from the European Union Agency for Cyber Security (ENISA &#8211; the study &#8221; How to setup up CSIRT and SOC&#8221;\u00a0<a tabindex=\"0\" href=\"https:\/\/www.enisa.europa.eu\/publications\/how-to-set-up-csirt-and-soc\" target=\"_blank\" rel=\"noopener\">https:\/\/www.enisa.europa.eu\/publications\/how-to-set-up-csirt-and-soc<\/a>\u00a0) costs can reach 120-180,000 euros\/year for a small CSIRT (3 members ) and over 480,000 euros\/year for an extended center (+12 members) capable of providing services 24\/7 for 365 days a year.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1e3ebde35758f\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><h4 class=\"n2-font-ab444ba538caf7a67c68dfe1757411d5-paragraph \"><b>Outsourcing to Safetech? What are the benefits?<\/b><\/h4><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1fffd679bc869\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">By outsourcing monitoring, analysis and response to attacks attempts, companies have access to a higher level of expertise and cyber resilience. An accredited CERT operates on the basis of well-established procedures and processes adapted to each client&#8217;s security infrastructure.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-178334ec84bf2\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Moreover, with a large range of customers, specialized teams can quickly identify various types of attacks and propose preventive measures at the level of all customers, before they become victims of cyber attacks.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1b81be47fab1d\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Standard workflow within Safetech\u2019 CERT includes: event notification and takeover, assignment to a specialist and escalation to a higher level of support (if necessary), impact minimization, remediation and recovery, as well as post-remediation analysis, documentation, closing and reporting the incident.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1b2d822e5e1d0\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Companies that have used Safetech&#8217;s CERT services benefit from:<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1720f54f1992e\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-1abcafa2e4770fd51f2e447a985a1ea9-paragraph \"><b>&#8211; Extended coverage of security risks.<\/b><\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-16df1f0af4548\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Safetech Innovations is a specialist company with extensive experience in this field and offering an extensive range of cyber security services. Access to advanced security tools and Threat Intellligence services, as well as its customer base, allow the STI CERT specialists to capitalize on the knowledge gained regarding certain incidents (indicators of compromise, attack surfaces, exploited vulnerabilities, types of attacks etc.) from other similar cases. The experience and the ability to extrapolate security information provide the necessary support for a proactive approach to each client&#8217;s specific risks.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-177069b6fa31a\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-1abcafa2e4770fd51f2e447a985a1ea9-paragraph \"><b>&#8211; Availability 24\/7, 365 days ensured by a team with validated procedures and methodologies.<\/b><\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1b2ad9a191e8c\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">STI CERT ensures permanent monitoring and management of threats through a team of more than 25 specialists, assigned to three levels of support. Safetech contractually declares its response time and its services are covered by an insurance policy.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1c6f4c587fa11\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-1abcafa2e4770fd51f2e447a985a1ea9-paragraph \"><b>&#8211; Financial predictability.<\/b><\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1632ad978edb8\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">By outsourcing security operations to STI CERT, companies gain financial stability, efficiency and predictable costs, and the services delivered allow customers to detect the first steps of attack attempts, preventing operational interruptions and data loss, thus managing risks and avoiding damages.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-123015325e6aa\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-1abcafa2e4770fd51f2e447a985a1ea9-paragraph \"><b>&#8211; Certified services at the highest level.<\/b><\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1e0258463455f\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">The technical and operational quality of the services provided by STI CERT is confirmed by multiple accreditations ( Trusted Introducer , for example) but also the multiple personal certifications of the team members, through (ISC)\u00b2, ISACA and EC-Council.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1389747bac547\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-1abcafa2e4770fd51f2e447a985a1ea9-paragraph \"><b>&#8211; Reducing pressure on own security teams and avoiding overload.<\/b><\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1d82d76b644d4\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Outsourcing CERT services offered by Safetech compensates for insufficient human resources as well as the lack of internal expertise of clients.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1fb9811c01c11\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">In order to provide efficient services, the specialists from STI CERT need visibility into the security posture of the client&#8217;s IT systems, both at the network and endpoint level, by using specific cyber security tools such as SIEM (Security Information and Event Management), NDR (Network Detection and Response), EDR (Endpoint Detection and Response), NGFW (Next-Generation Firewall), XDR (Extended Detection and Response), PAM (Privileged Access Management) etc. Depending on their existence, the procedure for contracting and activating the services offered by Safetech Innovations also differs.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1f2346e6276b3\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">A guarantee for the quality of services is also the experience of the STI CERT staff, the team having over 15 years of experience in securing IT systems and solid expertise in field-specific technologies.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1cd47f589d71d\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><h4 class=\"n2-font-66aefe966effdec7a9172a6b220db457-paragraph \"><b>Customers, the best recommendation<\/b><\/h4><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1c15435fc4f63\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">The volume and complexity of cyber threats creates difficulties for any organization, whether or not they have in-house skills. In addition, compliance requirements and new cybersecurity regulations are becoming more stringent and require additional work. Safetech Innovations&#8217; portfolio of specialized cyber security solutions and services helps companies in any field overcome these challenges.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-15e32aca442d5\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Numerous Romanian organizations have chosen Safetech\u2019 solutions, as well as its services of system integration, consulting, vulnerability management, operations outsourcing, security audit, for improving their level of cybersecurity. The company has customers from the following industries: financial-banking, energy, oil and gas, utilities, health, insurance, industrial production, high tech, retail, distribution, public sector, consulting, gaming. Seven of the ten largest banks in Romania have chosen us as their cyber security service provider.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-10c936727eb63\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Safetech has also been involved in more than 100 critical infrastructure security projects in the United States, Canada, Mexico, Brazil, the European Union, UK, Switzerland, Morocco, Singapore, the Philippines, India, China and New Zealand.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-1ded76118ed07\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">Safetech Innovations SA is listed on the BSE (BSE: SAFE) and has locations in UK and UAE.<\/p><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-10fc5bbbb03a9\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div class=\"\"><p class=\"n2-font-ebfa41f6e640af63484638b831fde4d9-paragraph \">For more information about our services, commercial offers or practical evaluations, we invite you to contact us by email at\u00a0<a tabindex=\"0\" href=\"mailto:sales@safetech.ro\">sales@safetech.ro<\/a>\u00a0or by phone at 021 316 05 65.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents Last year, organizations in Romania faced a massive increase in the volume of IT threats, especially at the end of the year. In June, STS reported an intensification of DDoS attacks (also confirmed by the National Cyberint Center within the SRI), [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6640,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101],"tags":[102,103,105,104,106,107],"class_list":["post-11511","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-news","tag-automation","tag-cert-en","tag-compliance","tag-efficiency-improvement","tag-monitoring-and-response","tag-outsourcing"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts\/11511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=11511"}],"version-history":[{"count":11,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts\/11511\/revisions"}],"predecessor-version":[{"id":24100,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts\/11511\/revisions\/24100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media\/6640"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=11511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/categories?post=11511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/tags?post=11511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}