{"id":57289,"date":"2017-06-19T14:32:33","date_gmt":"2017-06-19T19:32:33","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57289"},"modified":"2017-06-19T14:32:33","modified_gmt":"2017-06-19T19:32:33","slug":"dynamic-whitelisting-future-of-computer-security","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/","title":{"rendered":"Dynamic Whitelisting: The Future of Computer Security"},"content":{"rendered":"<p>In a recent article on CSO Online, author Maria Korolov outlines the future of computer security and a\u00a0current front runner, Dynamic Whitelisting.<\/p>\n<p><!--more--><\/p>\n<h3>Whitelisting&#8217;s Negative Connotation<\/h3>\n<p>With the malware industry continuing to develop at an outstanding pace, businesses require security solutions that can\u00a0stay ahead of advanced attacks like WannaCry Ransomware before they happen. CSO Online author Maria Korolov outlines the current trend of whitelisting solutions and their past in her <a href=\"http:\/\/www.csoonline.com\/article\/3198749\/cyber-attacks-espionage\/with-new-dynamic-capabilities-will-whitelisting-finally-catch-on.html\">recent article<\/a>. Whitelisting solutions have been around for a very long time as application control or application whitelisting.<\/p>\n<p>They are very well known and are often looked down on because of the amount of work required to deploy and maintain them. In this past this has lead many companies and executives away from using a whitelisting solution even though it offers increased security. The headaches for IT and users at the company are deemed not worth it. However, a new type of whitelisting deemed Dynamic Whitelisting, an approach that <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic<\/a> has been taking for several years, is able to alleviate those concerns.<\/p>\n<h3>Enter Dynamic Whitelisting<\/h3>\n<p>Dynamic Whitelisting solutions like <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic<\/a> are able to remove a lot of the overhead required by taking on the\u00a0overall whitelist management from the individual company. <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic<\/a> maintains a whitelist on a global level that is constantly updated with new good software on a daily basis. This allows our customers to have the latest good software in their whitelist without having to manage it themselves. The dynamic approach provides the whitelisting model to a market that previously would not have considered whitelisting because of the work to deploy and maintain it.<\/p>\n<p>In Maria&#8217;s <a href=\"http:\/\/www.csoonline.com\/article\/3198749\/cyber-attacks-espionage\/with-new-dynamic-capabilities-will-whitelisting-finally-catch-on.html\">article<\/a>, she speaks with Rob Clyde a security consultant and member of the ISACA board of directors. Rob states, &#8220;I believe that the number one way to protect against ransomware technologically is the use of application control, or white listing&#8230;First generation whitelisting has been difficult to implement. Keeping that list together was a management nightmare, but recently in the last year or two it has become much more straightforward. With next generation whitelisting, the lists are automatically kept and are pre-populated with already trusted, well-known programs.&#8221;<\/p>\n<p>Taking a proactive approach to security is currently and will continue to be the most effective method. Using a dynamic whitelisting solution like <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic<\/a> and <a href=\"http:\/\/www.pcmatic.com\/pro\">PC Matic Pro<\/a> (for businesses) allows you unbeatable default-deny endpoint security without the overhead of past whitelist solutions. I&#8217;ll leave you with another quote from Maria&#8217;s article\u00a0by Frank Dickson, the research director at worldwide security products, a Framingham, Mass.-based\u00a0International Data Corp. He stated, &#8220;Fundamentally, we need to change the way we interact with the Internet&#8230;\u00a0<strong>This whole reactive approach we&#8217;ve taken for years just doesn&#8217;t work<\/strong>.&#8221;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>To read Maria&#8217;s full article on CSO Online, <a href=\"http:\/\/www.csoonline.com\/article\/3198749\/cyber-attacks-espionage\/with-new-dynamic-capabilities-will-whitelisting-finally-catch-on.html\">click here<\/a>.<\/p>\n<p>Read more about PC Matic <a href=\"http:\/\/pcmatic.com\/supported\">here<\/a>.<\/p>\n<p>Read more about PC Matic Pro <a href=\"http:\/\/www.pcmatic.com\/pro\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent article on CSO Online, author Maria Korolov outlines the future of computer security and a\u00a0current front runner, Dynamic Whitelisting.<\/p>\n","protected":false},"author":58,"featured_media":54342,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[],"class_list":["post-57289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dynamic Whitelisting: The Future of Computer Security<\/title>\n<meta name=\"description\" content=\"In a recent article on CSO Online, author Maria Korolov outlines the future of computer security and a current front runner, Dynamic Whitelisting.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dynamic Whitelisting: The Future of Computer Security\" \/>\n<meta property=\"og:description\" content=\"In a recent article on CSO Online, author Maria Korolov outlines the future of computer security and a current front runner, Dynamic Whitelisting.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-19T19:32:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_security_shield_15.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Devin Bergin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devin Bergin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/\"},\"author\":{\"name\":\"Devin Bergin\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\"},\"headline\":\"Dynamic Whitelisting: The Future of Computer Security\",\"datePublished\":\"2017-06-19T19:32:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/\"},\"wordCount\":493,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_security_shield_15.jpg\",\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/\",\"name\":\"Dynamic Whitelisting: The Future of Computer Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_security_shield_15.jpg\",\"datePublished\":\"2017-06-19T19:32:33+00:00\",\"description\":\"In a recent article on CSO Online, author Maria Korolov outlines the future of computer security and a current front runner, Dynamic Whitelisting.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_security_shield_15.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_security_shield_15.jpg\",\"width\":500,\"height\":278,\"caption\":\"Shield Lock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dynamic-whitelisting-future-of-computer-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dynamic Whitelisting: The Future of Computer Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\",\"name\":\"Devin Bergin\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/devin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dynamic Whitelisting: The Future of Computer Security","description":"In a recent article on CSO Online, author Maria Korolov outlines the future of computer security and a current front runner, Dynamic Whitelisting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/","og_locale":"en_US","og_type":"article","og_title":"Dynamic Whitelisting: The Future of Computer Security","og_description":"In a recent article on CSO Online, author Maria Korolov outlines the future of computer security and a current front runner, Dynamic Whitelisting.","og_url":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-06-19T19:32:33+00:00","og_image":[{"width":500,"height":278,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_security_shield_15.jpg","type":"image\/jpeg"}],"author":"Devin Bergin","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Devin Bergin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/"},"author":{"name":"Devin Bergin","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe"},"headline":"Dynamic Whitelisting: The Future of Computer Security","datePublished":"2017-06-19T19:32:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/"},"wordCount":493,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_security_shield_15.jpg","articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/","url":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/","name":"Dynamic Whitelisting: The Future of Computer Security","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_security_shield_15.jpg","datePublished":"2017-06-19T19:32:33+00:00","description":"In a recent article on CSO Online, author Maria Korolov outlines the future of computer security and a current front runner, Dynamic Whitelisting.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_security_shield_15.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_security_shield_15.jpg","width":500,"height":278,"caption":"Shield Lock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/dynamic-whitelisting-future-of-computer-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Dynamic Whitelisting: The Future of Computer Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe","name":"Devin Bergin","url":"https:\/\/www.pcmatic.com\/blog\/author\/devin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57289"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57289\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/54342"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}