{"id":3958,"date":"2019-11-11T11:30:01","date_gmt":"2019-11-11T09:30:01","guid":{"rendered":"https:\/\/www.dazzlepop.net\/site\/?p=3958"},"modified":"2020-04-23T12:05:58","modified_gmt":"2020-04-23T10:05:58","slug":"how-leaders-can-create-security-resilience","status":"publish","type":"post","link":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/","title":{"rendered":"How Leaders Can Create Security Resilience"},"content":{"rendered":"<div style=\"text-align:center\"><img decoding=\"async\" src=\";https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"How Leaders Can Create Security Resilience\" title=\"How Leaders Can Create Security Resilience\" \/><\/div>\n<p>How Leaders Can Create Security Resilience. KIEV, UKRAINE &#8211; 2018\/12\/29: In this photo illustration, the <a href=\"https:\/\/www.dazzlepop.net\/site\/category\/technology\/\">Adobe Inc.<\/a> Computer software company\u00a0logo seen displayed on a smartphone. (Photo Illustration by Igor Golovniov\/SOPA Images\/LightRocket via Getty Images) LIGHTROCKET VIA GETTY IMAGES <\/p>\n\n\n\n<p>Last week, Adobe Inc. suffered a cyber breach wherein the email addresses of more than\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/theblog.adobe.com\/security-update\/\" target=\"_blank\">7.5 million customers<\/a>\u00a0were exposed. For <a href=\"https:\/\/www.dazzlepop.net\/site\/category\/technology\/\">Adobe<\/a>\u2019s leadership, it was a stark reminder of the company\u2019s 2013 breach, in which 38 million usernames and passwords were stolen.\u00a0<\/p>\n\n\n\n<p>Across the globe, breaches are occurring at an alarming frequency. Earlier this year, the\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.weforum.org\/reports\/the-cybersecurity-guide-for-leaders-in-today-s-digital-world\" target=\"_blank\">World Economic Forum<\/a>\u00a0ranked \u201cdata fraud and theft\u201d and \u201ccyberattacks\u201d as fourth and fifth on the list of the \u201ctop 10 global risks of highest concern for the next decade.\u201d Unless cybersecurity efforts match the pace of technological advances, the organization estimates these threats could cost as much as $90 trillion by 2030.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thumbor.forbes.com\/thumbor\/fit-in\/416x416\/filters%3Aformat%28jpg%29\/https%3A%2F%2Fspecials-images.forbesimg.com%2Fimageserve%2F5b92908ca7ea434b99d5a010%2F0x0.jpg%3Fbackground%3D000000%26cropX1%3D0%26cropX2%3D416%26cropY1%3D0%26cropY2%3D416\" alt=\"How Leaders Can Create Security Resilience\" \/><\/figure>\n\n\n\n<p>Despite these dire predictions, many businesses are failing to keep up. More than two-thirds (<a href=\"https:\/\/www.businesswire.com\/news\/home\/20191015005326\/en\/Ponemon-Study-28-Percent-Enterprises-CEO-Board\" target=\"_blank\" rel=\"noreferrer noopener\">69%<\/a>) of employees feel their organization\u2019s cybersecurity approach is \u201creactive and incident driven.\u201d That is unacceptable. Leaders cannot afford to wait for an incident to occur, and cannot relegate cybersecurity to the confines of the IT department. Instead, leaders should take a proactive and integrated approach toward combating the rising number of cyber crimes and cloud-based vulnerabilities. Here are three ways they can start today.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. Improve Your Security Team<\/h4>\n\n\n\n<p>A 2018&nbsp;<a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/digital-trust\/2018-insights.html\" target=\"_blank\" rel=\"noreferrer noopener\">PricewaterhouseCoopers<\/a>&nbsp;(PwC) survey found that just 39% of respondents were \u201cvery comfortable with the sufficiency\u201d of their cybersecurity and privacy workforce, and just 33% believed their companies were \u201cfully ready to meet recent and emerging requirements for cybersecurity, data privacy, and data-use governance.\u201d In all honesty, the time to build a cybersecurity team was yesterday. If a company is among those that have not yet hired an adequate workforce, it should do so immediately.&nbsp;<\/p>\n\n\n\n<p>The most important position on the security team is the chief information security officer (CISO or CSO) \u2014\u00a0which, incredibly,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazineuk.com\/wheres-cisos-missing-third-fortune-500\/article\/1661131\" target=\"_blank\">38% of Fortune 500 companies<\/a>\u00a0do not currently have. These CISO-less companies are making the same mistake as Target, whose 2013 breach exposed the credit and debit card data of 40 million customers.\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/blogs.wsj.com\/cio\/2014\/09\/30\/targets-lack-of-ciso-was-root-cause-of-systems-breach\/\" target=\"_blank\">According to a former manager<\/a>, the lack of a CISO was a \u201croot cause\u201d of the breach.<\/p>\n\n\n\n<p>Source:  <a href=\"https:\/\/www.forbes.com\/sites\/jasonwingard\/2019\/11\/08\/adobes-cyber-woes--how-leaders-can-create-security-resilience\/#1da7c05f5831\">https:\/\/www.forbes.com\/sites\/jasonwingard\/2019\/11\/08\/adobes-cyber-woes&#8211;how-leaders-can-create-security-resilience\/#1da7c05f5831<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>How Leaders Can Create Security Resilience. KIEV, UKRAINE &#8211; 2018\/12\/29: In this photo illustration, the Adobe Inc. Computer software company\u00a0logo seen displayed on a smartphone. (Photo Illustration by Igor Golovniov\/SOPA Images\/LightRocket via Getty Images) LIGHTROCKET VIA GETTY IMAGES Last week, Adobe Inc. suffered a cyber breach wherein the email addresses of more than\u00a07.5 million customers\u00a0were [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7672,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"categories":[48],"tags":[250,131,161,203,37],"class_list":["post-3958","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-adobe","tag-computer","tag-email","tag-software","tag-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dazzlepop | How Leaders Can Create Security Resilience<\/title>\n<meta name=\"description\" content=\"How Leaders Can Create Security Resilience. KIEV, UKRAINE - 2018\/12\/29: In this photo illustration, the Adobe Inc. Computer software company\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dazzlepop | How Leaders Can Create Security Resilience\" \/>\n<meta property=\"og:description\" content=\"How Leaders Can Create Security Resilience. KIEV, UKRAINE - 2018\/12\/29: In this photo illustration, the Adobe Inc. Computer software company\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Dazzlepop\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dp.Dazzlepop\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-11T09:30:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-23T10:05:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale\" \/>\n<meta name=\"author\" content=\"Noura Ibrahim\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale\" \/>\n<meta name=\"twitter:creator\" content=\"@dazzle_pop\" \/>\n<meta name=\"twitter:site\" content=\"@dazzle_pop\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Noura Ibrahim\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/\"},\"author\":{\"name\":\"Noura Ibrahim\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#\/schema\/person\/53e5e5cffa9109e865719dcfdc83b6b5\"},\"headline\":\"How Leaders Can Create Security Resilience\",\"datePublished\":\"2019-11-11T09:30:01+00:00\",\"dateModified\":\"2020-04-23T10:05:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/\"},\"wordCount\":387,\"publisher\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#primaryimage\"},\"thumbnailUrl\":\";https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale\",\"keywords\":[\"Adobe\",\"computer\",\"Email\",\"Software\",\"Technology\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/\",\"url\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/\",\"name\":\"Dazzlepop | How Leaders Can Create Security Resilience\",\"isPartOf\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#primaryimage\"},\"thumbnailUrl\":\";https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale\",\"datePublished\":\"2019-11-11T09:30:01+00:00\",\"dateModified\":\"2020-04-23T10:05:58+00:00\",\"description\":\"How Leaders Can Create Security Resilience. KIEV, UKRAINE - 2018\/12\/29: In this photo illustration, the Adobe Inc. Computer software company\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#primaryimage\",\"url\":\";https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale\",\"contentUrl\":\";https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale\",\"caption\":\"How Leaders Can Create Security Resilience\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dazzlepop.net\/site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Leaders Can Create Security Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#website\",\"url\":\"https:\/\/www.dazzlepop.net\/site\/\",\"name\":\"Dazzlepop\",\"description\":\"Digital Marketing Solutions\",\"publisher\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dazzlepop.net\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#organization\",\"name\":\"Dazzlepop\",\"url\":\"https:\/\/www.dazzlepop.net\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dazzlepop.net\/site\/wp-content\/uploads\/2018\/04\/dazzlepop-512.jpg\",\"contentUrl\":\"https:\/\/www.dazzlepop.net\/site\/wp-content\/uploads\/2018\/04\/dazzlepop-512.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dazzlepop\"},\"image\":{\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dp.Dazzlepop\",\"https:\/\/x.com\/dazzle_pop\",\"https:\/\/www.instagram.com\/dp.dazzlepop\/\",\"https:\/\/www.linkedin.com\/in\/dazzlepop\/\",\"https:\/\/www.pinterest.com\/Mohamed_Adel_DP\/\",\"https:\/\/www.youtube.com\/channel\/UCmtf4MMftrDRlG--YoTp9Yw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#\/schema\/person\/53e5e5cffa9109e865719dcfdc83b6b5\",\"name\":\"Noura Ibrahim\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dazzlepop.net\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4de07542ac2857d52bf2184388f6d21b2fbadf67239967f75ce4be7cc4216a04?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4de07542ac2857d52bf2184388f6d21b2fbadf67239967f75ce4be7cc4216a04?s=96&d=mm&r=g\",\"caption\":\"Noura Ibrahim\"},\"url\":\"https:\/\/www.dazzlepop.net\/site\/author\/noura\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dazzlepop | How Leaders Can Create Security Resilience","description":"How Leaders Can Create Security Resilience. KIEV, UKRAINE - 2018\/12\/29: In this photo illustration, the Adobe Inc. Computer software company","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/","og_locale":"en_US","og_type":"article","og_title":"Dazzlepop | How Leaders Can Create Security Resilience","og_description":"How Leaders Can Create Security Resilience. KIEV, UKRAINE - 2018\/12\/29: In this photo illustration, the Adobe Inc. Computer software company","og_url":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/","og_site_name":"Dazzlepop","article_publisher":"https:\/\/www.facebook.com\/dp.Dazzlepop","article_published_time":"2019-11-11T09:30:01+00:00","article_modified_time":"2020-04-23T10:05:58+00:00","og_image":[{"url":"https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale","type":"","width":"","height":""}],"author":"Noura Ibrahim","twitter_card":"summary_large_image","twitter_image":"https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale","twitter_creator":"@dazzle_pop","twitter_site":"@dazzle_pop","twitter_misc":{"Written by":"Noura Ibrahim","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#article","isPartOf":{"@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/"},"author":{"name":"Noura Ibrahim","@id":"https:\/\/www.dazzlepop.net\/site\/#\/schema\/person\/53e5e5cffa9109e865719dcfdc83b6b5"},"headline":"How Leaders Can Create Security Resilience","datePublished":"2019-11-11T09:30:01+00:00","dateModified":"2020-04-23T10:05:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/"},"wordCount":387,"publisher":{"@id":"https:\/\/www.dazzlepop.net\/site\/#organization"},"image":{"@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#primaryimage"},"thumbnailUrl":";https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale","keywords":["Adobe","computer","Email","Software","Technology"],"articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/","url":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/","name":"Dazzlepop | How Leaders Can Create Security Resilience","isPartOf":{"@id":"https:\/\/www.dazzlepop.net\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#primaryimage"},"image":{"@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#primaryimage"},"thumbnailUrl":";https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale","datePublished":"2019-11-11T09:30:01+00:00","dateModified":"2020-04-23T10:05:58+00:00","description":"How Leaders Can Create Security Resilience. KIEV, UKRAINE - 2018\/12\/29: In this photo illustration, the Adobe Inc. Computer software company","breadcrumb":{"@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#primaryimage","url":";https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale","contentUrl":";https:\/\/specials-images.forbesimg.com\/imageserve\/1076038736\/960x0.jpg?fit=scale","caption":"How Leaders Can Create Security Resilience"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dazzlepop.net\/site\/how-leaders-can-create-security-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dazzlepop.net\/site\/"},{"@type":"ListItem","position":2,"name":"How Leaders Can Create Security Resilience"}]},{"@type":"WebSite","@id":"https:\/\/www.dazzlepop.net\/site\/#website","url":"https:\/\/www.dazzlepop.net\/site\/","name":"Dazzlepop","description":"Digital Marketing Solutions","publisher":{"@id":"https:\/\/www.dazzlepop.net\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dazzlepop.net\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dazzlepop.net\/site\/#organization","name":"Dazzlepop","url":"https:\/\/www.dazzlepop.net\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dazzlepop.net\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.dazzlepop.net\/site\/wp-content\/uploads\/2018\/04\/dazzlepop-512.jpg","contentUrl":"https:\/\/www.dazzlepop.net\/site\/wp-content\/uploads\/2018\/04\/dazzlepop-512.jpg","width":512,"height":512,"caption":"Dazzlepop"},"image":{"@id":"https:\/\/www.dazzlepop.net\/site\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dp.Dazzlepop","https:\/\/x.com\/dazzle_pop","https:\/\/www.instagram.com\/dp.dazzlepop\/","https:\/\/www.linkedin.com\/in\/dazzlepop\/","https:\/\/www.pinterest.com\/Mohamed_Adel_DP\/","https:\/\/www.youtube.com\/channel\/UCmtf4MMftrDRlG--YoTp9Yw"]},{"@type":"Person","@id":"https:\/\/www.dazzlepop.net\/site\/#\/schema\/person\/53e5e5cffa9109e865719dcfdc83b6b5","name":"Noura Ibrahim","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dazzlepop.net\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4de07542ac2857d52bf2184388f6d21b2fbadf67239967f75ce4be7cc4216a04?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4de07542ac2857d52bf2184388f6d21b2fbadf67239967f75ce4be7cc4216a04?s=96&d=mm&r=g","caption":"Noura Ibrahim"},"url":"https:\/\/www.dazzlepop.net\/site\/author\/noura\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/posts\/3958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/comments?post=3958"}],"version-history":[{"count":3,"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/posts\/3958\/revisions"}],"predecessor-version":[{"id":7671,"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/posts\/3958\/revisions\/7671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/media\/7672"}],"wp:attachment":[{"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/media?parent=3958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/categories?post=3958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dazzlepop.net\/site\/wp-json\/wp\/v2\/tags?post=3958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}