{"id":14241,"date":"2025-07-21T09:00:00","date_gmt":"2025-07-21T13:00:00","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=14241"},"modified":"2026-01-15T06:50:30","modified_gmt":"2026-01-15T11:50:30","slug":"how-prepared-are-cisos-for-domain-based-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/","title":{"rendered":"How Prepared are CISOs for Domain-Based Cyber Threats?"},"content":{"rendered":"\n<p><em>Domain-related infrastructures are growing in size and complexity\u2014but, without strong security measures in place, companies are left vulnerable to increasingly potent cyber risks. With just 7% of CISOs admitting they\u2019re confident in their company\u2019s ability to mitigate domain-based attacks, it\u2019s crucial internal security teams start to raise their game.<\/em><\/p>\n\n\n\n<p>Corporations, their partners, and customers are becoming ever more connected. It\u2019s now effectively impossible for any sizeable business to operate without email gateways, websites, domain name system (DNS) names, web servers, and a host of other integrated communication ecosystems.<\/p>\n\n\n\n<p>The challenge for organizations is that the number of online resources exposed to the outside world continues to proliferate. Vital digital infrastructure has become a relatively soft target open to attack by bad actors, either as one-off cyber attacks or as a gateway to launch further incursions such as phishing or ransomware.<\/p>\n\n\n\n<p>To understand how chief information security officers (CISOs) are responding to such domain-based threats, we commissioned independent research among CISOs, chief information officers (CIOs), and other senior IT professionals globally for our <a href=\"https:\/\/www.cscdbs.com\/en\/resources\/2025-ciso-cybersecurity-outlook-report\/\">CISO Outlook 2025<\/a> report.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Few respondents are on track to tackle domain-based attacks<\/strong><\/h2>\n\n\n\n<p>When asked how confident CISOs are in their company\u2019s ability to mitigate domain attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Just 7% say they\u2019re very confident, adding their organization has robust tried-and-tested measures in place<\/li>\n\n\n\n<li>76% say they\u2019re somewhat confident, stating they\u2019ve taken key steps but recognize areas for improvement<\/li>\n\n\n\n<li>17% are neutral, telling us their firm has made some efforts so far, but there\u2019s no strategy in place<\/li>\n<\/ul>\n\n\n\n<p>The concern that only 7% of organizations feel fully prepared to handle domain-based attacks is amplified by their sentiment around how quickly they could take action to delete specific fraudulent domain assets. Less than a quarter of CISOs say they\u2019re in an optimal position to take down this type of cyber threat.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>22% say they have the right tools and processes in place to react quickly and effectively to take down the threat<\/li>\n\n\n\n<li>59% have tools and processes in place, but say it\u2019s a complex and time-consuming process to take down the threat<\/li>\n\n\n\n<li>15% have some processes in place, but their approach is not optimized to deal with cyber threats<\/li>\n<\/ul>\n\n\n\n<p>Our study also found that three-quarters of respondents use a trusted DNS provider to manage digital threats targeting their attack surface and digital assets, but only half have developed and regularly test incident response plans, and half use an AI-based monitoring and enforcement solution.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is the potential impact of domain-based attacks?<\/strong><\/h2>\n\n\n\n<p>The lack of preparedness for domain-based attacks uncovered in our research highlights the vulnerability of company attack surfaces and digital assets. How many companies could operate with their email or web servers offline for even one day? Hackers often target domain names or websites with specific threat vectors such as cybersquatting or DNS cache poisoning. We\u2019re seeing high volumes of such attacks already, and we expect them to grow drastically in 2025 as off-the-shelf tools and attack kits become more accessible.<\/p>\n\n\n\n<p>Not only that, but domain-based incidents are seen as an easy entry point for attacks on corporate assets. We\u2019re seeing more incidences of hybrid or blended attacks. They may begin with a DNS attack that compromises a corporate website, then go on to transmit malware across the whole core platform, leading to a damaging distributed denial of service (DDoS) attack.<\/p>\n\n\n\n<p>CISOs must ensure they\u2019re building domain security into their overall security posture. Without domain security, criminals can redirect websites for financial gain, intercept email to conduct espionage, and even harvest credentials to breach organizations\u2019 networks.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How can CSC help?<\/strong><\/h2>\n\n\n\n<p>As the world&#8217;s leading corporate domain name registrar, CSC offers the most innovative, next-generation domain management and security solutions, coupled with online brand and fraud protection.<\/p>\n\n\n\n<p>CSC is well placed to help enterprises in the domain security ecosystem. We provide a multi-layered cybersecurity approach that employs various security measures across different layers, including domains. <a href=\"https:\/\/www.cscdbs.com\/en\/domainsec-threat-intelligence-platform\/\">DomainSec<sup>SM<\/sup><\/a> is our new, comprehensive platform for domain security. Powered by a correlation engine and machine learning technology, it brings together a variety of data sets and blocking networks only available to CSC, enabling threat intelligence based on domain security insights.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/en\/resources\/2025-ciso-cybersecurity-outlook-report\/\">Read our report<\/a> to find out more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organizations expose more online resources to the outside world today than ever before. Explore how a robust security strategy helps block cyber attacks.<\/p>\n","protected":false},"author":17,"featured_media":10472,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[548,521],"tags":[],"class_list":["post-14241","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Prepared are CISOs for Domain-Based Cyber Threats? | CSC<\/title>\n<meta name=\"description\" content=\"Organizations expose more online resources to the outside world today than ever before. Explore how a robust security strategy helps block cyber attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Prepared are CISOs for Domain-Based Cyber Threats? | CSC\" \/>\n<meta property=\"og:description\" content=\"Organizations expose more online resources to the outside world today than ever before. Explore how a robust security strategy helps block cyber attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-21T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T11:50:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arielle Wallace\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arielle Wallace\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/\"},\"author\":{\"name\":\"Arielle Wallace\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\"},\"headline\":\"How Prepared are CISOs for Domain-Based Cyber Threats?\",\"datePublished\":\"2025-07-21T13:00:00+00:00\",\"dateModified\":\"2026-01-15T11:50:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/\"},\"wordCount\":706,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55051.jpg\",\"articleSection\":[\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/\",\"name\":\"How Prepared are CISOs for Domain-Based Cyber Threats? | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55051.jpg\",\"datePublished\":\"2025-07-21T13:00:00+00:00\",\"dateModified\":\"2026-01-15T11:50:30+00:00\",\"description\":\"Organizations expose more online resources to the outside world today than ever before. Explore how a robust security strategy helps block cyber attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55051.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55051.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-prepared-are-cisos-for-domain-based-cyber-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Prepared are CISOs for Domain-Based Cyber Threats?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\",\"name\":\"Arielle Wallace\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Prepared are CISOs for Domain-Based Cyber Threats? | CSC","description":"Organizations expose more online resources to the outside world today than ever before. Explore how a robust security strategy helps block cyber attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"How Prepared are CISOs for Domain-Based Cyber Threats? | CSC","og_description":"Organizations expose more online resources to the outside world today than ever before. Explore how a robust security strategy helps block cyber attacks.","og_url":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2025-07-21T13:00:00+00:00","article_modified_time":"2026-01-15T11:50:30+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","type":"image\/jpeg"}],"author":"Arielle Wallace","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Arielle Wallace","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/"},"author":{"name":"Arielle Wallace","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8"},"headline":"How Prepared are CISOs for Domain-Based Cyber Threats?","datePublished":"2025-07-21T13:00:00+00:00","dateModified":"2026-01-15T11:50:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/"},"wordCount":706,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","articleSection":["Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/","url":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/","name":"How Prepared are CISOs for Domain-Based Cyber Threats? | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","datePublished":"2025-07-21T13:00:00+00:00","dateModified":"2026-01-15T11:50:30+00:00","description":"Organizations expose more online resources to the outside world today than ever before. Explore how a robust security strategy helps block cyber attacks.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/how-prepared-are-cisos-for-domain-based-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Prepared are CISOs for Domain-Based Cyber Threats?"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8","name":"Arielle Wallace"}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/14241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=14241"}],"version-history":[{"count":2,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/14241\/revisions"}],"predecessor-version":[{"id":14742,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/14241\/revisions\/14742"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10472"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=14241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=14241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=14241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}