{"id":55915,"date":"2017-01-05T15:42:55","date_gmt":"2017-01-05T15:42:55","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=55915"},"modified":"2017-01-09T17:07:04","modified_gmt":"2017-01-09T17:07:04","slug":"department-of-homeland-security-lists-whitelisting-as-a-top-strategy","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/","title":{"rendered":"Homeland Security Continues Recommending Application Whitelisting"},"content":{"rendered":"<p>In a report detailing the Russian malicious cyber activity, the Department of Homeland Security has listed Application Whitelisting as a top mitigation strategy.<\/p>\n<p><!--more--><\/p>\n<p>The Department of Homeland Security has been a big proponent of Application Whitelisting as a top strategy to protect your systems from malware. In July of 2016 they released a <a href=\"https:\/\/www.us-cert.gov\/security-publications\/Ransomware\">report<\/a> detailing the best practices to protect yourself from the ransomware epidemic. Application Whitelisting came in on their list of top mitigation strategies because it only allows specified\u00a0applications to run.<\/p>\n<p>Last week they released another <a href=\"https:\/\/www.us-cert.gov\/security-publications\/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity\">report<\/a> in combination with the FBI detailing Russian\u00a0malicious cyber activity known as GRIZZLY STEPPE. The report contains a deep technical look into the activity and behavior of Russian malware. They also outline their top seven mitigation strategies, encouraging network admins to implement these\u00a0recommendations. In this section, they highlight the importance of using application whitelisting as it is <em>&#8220;one of the best security strategies&#8221;<\/em>, alongside patch management and others.<\/p>\n<blockquote><p>&#8220;1. Patch applications and operating systems \u2013 Vulnerable applications and operating systems are the targets of most attacks. Ensuring these are patched with the latest updates greatly reduces the number of exploitable entry points available to an attacker. Use best practices when updating software and patches by only downloading updates from authenticated vendor sites<\/p>\n<p>2. Application whitelisting \u2013 Whitelisting is one of the best security strategies because it allows only specified programs to run while blocking all others, including malicious software.&#8221;<\/p><\/blockquote>\n<p>We stand with the FBI and DHS that application whitelisting is a necessary approach. This is why <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic&#8217;s<\/a> protection is based on an automated global whitelist, allowing us to remove the work that comes with traditional application whitelisting. We only allow known good applications and block all unknowns no matter how targeted or new they are. This allows you to stay on top of the newest\u00a0malware\u00a0as they will never be on our whitelist and will be blocked. <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic<\/a> also includes patch management to update your vulnerable applications automatically, allowing you to easily stay on top of vendor vulnerabilities.<\/p>\n<p>You can read the full list of recommendations by the FBI and Department of Homeland Security on page 7 of <a href=\"https:\/\/www.us-cert.gov\/sites\/default\/files\/publications\/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf\">the report<\/a>.\u00a0You can also find out more about <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic&#8217;s<\/a>\u00a0globally automated whitelist <a href=\"https:\/\/www.pcmatic.com\/whitelist\">here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a report detailing the Russian malicious cyber activity, the Department of Homeland Security has listed Application Whitelisting as a top mitigation strategy.<\/p>\n","protected":false},"author":58,"featured_media":55960,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[],"class_list":["post-55915","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Homeland Security Continues Recommending Application Whitelisting<\/title>\n<meta name=\"description\" content=\"In a report detailing Russian cyber activity, the Department of Homeland Security has listed Application Whitelisting as a top mitigation strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Homeland Security Continues Recommending Application Whitelisting\" \/>\n<meta property=\"og:description\" content=\"In a report detailing Russian cyber activity, the Department of Homeland Security has listed Application Whitelisting as a top mitigation strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-05T15:42:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-09T17:07:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/homeland.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Devin Bergin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devin Bergin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/\"},\"author\":{\"name\":\"Devin Bergin\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\"},\"headline\":\"Homeland Security Continues Recommending Application Whitelisting\",\"datePublished\":\"2017-01-05T15:42:55+00:00\",\"dateModified\":\"2017-01-09T17:07:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/\"},\"wordCount\":380,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/homeland.jpg\",\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/\",\"name\":\"Homeland Security Continues Recommending Application Whitelisting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/homeland.jpg\",\"datePublished\":\"2017-01-05T15:42:55+00:00\",\"dateModified\":\"2017-01-09T17:07:04+00:00\",\"description\":\"In a report detailing Russian cyber activity, the Department of Homeland Security has listed Application Whitelisting as a top mitigation strategy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/homeland.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/homeland.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Homeland Security Continues Recommending Application Whitelisting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\",\"name\":\"Devin Bergin\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/devin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Homeland Security Continues Recommending Application Whitelisting","description":"In a report detailing Russian cyber activity, the Department of Homeland Security has listed Application Whitelisting as a top mitigation strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Homeland Security Continues Recommending Application Whitelisting","og_description":"In a report detailing Russian cyber activity, the Department of Homeland Security has listed Application Whitelisting as a top mitigation strategy.","og_url":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-01-05T15:42:55+00:00","article_modified_time":"2017-01-09T17:07:04+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/homeland.jpg","type":"image\/jpeg"}],"author":"Devin Bergin","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Devin Bergin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/"},"author":{"name":"Devin Bergin","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe"},"headline":"Homeland Security Continues Recommending Application Whitelisting","datePublished":"2017-01-05T15:42:55+00:00","dateModified":"2017-01-09T17:07:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/"},"wordCount":380,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/homeland.jpg","articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/","url":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/","name":"Homeland Security Continues Recommending Application Whitelisting","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/homeland.jpg","datePublished":"2017-01-05T15:42:55+00:00","dateModified":"2017-01-09T17:07:04+00:00","description":"In a report detailing Russian cyber activity, the Department of Homeland Security has listed Application Whitelisting as a top mitigation strategy.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/homeland.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/homeland.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Homeland Security Continues Recommending Application Whitelisting"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe","name":"Devin Bergin","url":"https:\/\/www.pcmatic.com\/blog\/author\/devin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/55915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=55915"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/55915\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55960"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=55915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=55915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=55915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}