{"id":20332,"date":"2021-04-23T13:42:03","date_gmt":"2021-04-23T11:42:03","guid":{"rendered":"https:\/\/datanets.ro\/?p=20332"},"modified":"2021-05-04T11:16:31","modified_gmt":"2021-05-04T09:16:31","slug":"splunk-uba","status":"publish","type":"post","link":"https:\/\/datanets.ro\/en\/splunk-uba\/","title":{"rendered":"Discover unknown threats with Splunk UBA"},"content":{"rendered":"<p>Hidden threats, inside risks, and sophisticated attacks are difficult to detect using traditional security solutions. Splunk UBA (User Behavior Analytics) helps companies control this type of threat using advanced analysis and Machine Learning technologies and integration with the Splunk Enterprise SIEM system. Early detection of unknown or internal threats is becoming increasingly difficult for companies, due to the increase of cyber-attacks and the diversification of penetration and propagation methods.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-20325 size-full aligncenter\" title=\"Splunk UBA, SIEM Splunk, User Behavior Analytics\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2021\/04\/splunk-uba-software-licensing-1.jpg\" alt=\"\" width=\"672\" height=\"393\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2021\/04\/splunk-uba-software-licensing-1.jpg 672w, https:\/\/datanets.ro\/wp-content\/uploads\/2021\/04\/splunk-uba-software-licensing-1-300x175.jpg 300w\" sizes=\"(max-width: 672px) 100vw, 672px\" \/><\/p>\n<p>Internal threats, in turn, are also increasing. According to <a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2020-insider-threat\"><strong>ENISA<\/strong><\/a> data, last year 88% of organizations considered &#8220;insider threats&#8221; a real danger. And 40% said that their critical business data was vulnerable to such types of risks.<\/p>\n<p>However, the difficulty of detecting threats is also due to the fact that the IT departments are struggling with large volumes of false-positive alerts. According to studies, in 2017, a big company received, on average, over 10,000 alerts per month. More than half (52%) of these were false-positives, while almost two-thirds (64%) were redundant. For this reason, companies investigated only 56% of daily security alerts, according to the <a href=\"https:\/\/newsroom.cisco.com\/press-release-content?type=webcontent&amp;articleId=1818259\"><strong>Cisco<\/strong><\/a> report from the same year. After four years, the situation did not improve.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Splunk UBA, the answer to hidden threats <\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>The Datanet solution for this cumulative problems is <a href=\"https:\/\/datanets.ro\/solutie-siem-splunk\/\"><strong>Splunk Enterprise Security (ES)<\/strong><\/a>, a SIEM system that helps companies to identify, investigate, and quickly respond to threats and attacks and anything abnormal activity that tends to affect their activity. The early detection capability of the SIEM system is enhanced by integration with the Splunk User Behavior Analytics (UBA) application. The UBA solution automatically detects abnormal behavior of users, equipment, applications, and privileged accounts, aggregates them into patterns, and delivers actionable information.<\/p>\n<p>For this, Splunk UBA uses advanced methods of modeling and behavioral analysis, as well as Machine Learning (ML) algorithms. With the help of aggregated data from multiple sources (via Splunk ES), the solution detects and associates in real-time the identity of users with IP addresses and the patterns discovered. ML algorithms and peer group analyzes, which use categories of users to assess and classify their behavior, ensure that any deviation from established patterns is identified.<\/p>\n<p>Splunk UBA thus ensures the detection of cases of:<\/p>\n<ul>\n<li>Abusive use of privileged accounts and improper use of access permissions;<\/li>\n<li>Theft of confidential data;<\/li>\n<li>Compromise of access data;<\/li>\n<li>Abnormal behavior (such as unauthorized access to critical resources, attempts to access unusual connection locations, etc.)<\/li>\n<\/ul>\n<h2><strong>Not every anomaly is a threat <\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>Even if it detects any deviation from the patterns, the solution does not deliver a torrent of alerts when it discovers deviations. The ML technology developed by Splunk uses data correlation, statistical analysis, and learning algorithms to automatically reduce thousands of detected events to several hundred potential abnormal behaviors. Then, also automatically, with the help of dynamic classification rules and models, hundreds of anomalies are recognized in dozens of threats, which are reported to the computer security team.<\/p>\n<p>Also, the Splunk solution has the ability to detect, track, monitor, and correlate over time various anomalies that may signal a real threat. This feature provides increased efficiency in identifying &#8220;Low and Slow&#8221; attacks, which traditional detection methods fail to detect, considering that they are dealing with legitimate traffic.<\/p>\n<p>Another competitive advantage of the ML technology developed by Splunk is that learning mechanisms do not require human intervention. Thus, SOC teams no longer have to create templates and update and adapt sets of rules and signatures in advance to detect a threat.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The benefits of the integrated approach<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>Splunk UBA (User Behavior Analytics) assigns a risk score to each identified threat. The security responsible team can thus not only analyze them, but also priorities them, allocating the resources, and take preventive measures depending on their severity. In turn, the response measures can also be automated using the ability of Splunk ES and UBA to be integrated with numerous IT security systems for companies.<\/p>\n<p>Together, Splunk SE and Splunk UBA can quickly address the most sophisticated threats by sharing and correlating data about known anomalies and threats. By integrating data flows regarding detected behavioral deviations, the SIEM Splunk system expands its ability to identify unknown threats. The filtering alerts before reaching the SOC team gives them the needed time to focus on really urgent complex threats and to resolve them without the need for a security specialists\u2019 army.<\/p>\n<p>Datanet Systems specialists can help you leverage the capabilities of both Splunk solutions which enables you to increase the accuracy of the early detection processes, the speed of reaction, and the effectiveness of prevention and remedial measures. For more details about Splunk UBA, the advantages of Splunk SE\u2019s integration, and the Datanet commercial offer, contact us at <a href=\"mailto:sales@datanets.ro\"><strong>sales@datanets.ro<\/strong><\/a> .<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out how Splunk UBA (User Behavior Analytics) allows the elimination of unknown threats using advanced analysis technologies and Machine Learning.<\/p>\n","protected":false},"author":10,"featured_media":20321,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[28],"tags":[248,209,129,283],"class_list":["post-20332","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-trends","tag-cybersecurity-en-2","tag-it-security-architecture-en","tag-network-management-en","tag-network-management-en-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Discover unknown threats with Splunk UBA &#8211; Datanet Systems<\/title>\n<meta name=\"description\" content=\"Splunk UBA (User Behavior Analytics) allows the elimination of unknown threats using advanced analysis technologies and Machine Learning.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/en\/splunk-uba\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discover unknown threats with Splunk UBA &#8211; Datanet Systems\" \/>\n<meta property=\"og:description\" content=\"Splunk UBA (User Behavior Analytics) allows the elimination of unknown threats using advanced analysis technologies and Machine Learning.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/en\/splunk-uba\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-23T11:42:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-04T09:16:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2021\/04\/splunk-uba-software-licensing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"394\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Diana Zaharia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diana Zaharia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/\"},\"author\":{\"name\":\"Diana Zaharia\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/8e0fc08f37652fac2a619b527cca0248\"},\"headline\":\"Discover unknown threats with Splunk UBA\",\"datePublished\":\"2021-04-23T11:42:03+00:00\",\"dateModified\":\"2021-05-04T09:16:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/\"},\"wordCount\":780,\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/splunk-uba-software-licensing.jpg\",\"keywords\":[\"Cybersecurity\",\"IT Security Architecture\",\"Network Management\",\"Network Management\"],\"articleSection\":[\"Industry Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/\",\"name\":\"Discover unknown threats with Splunk UBA &#8211; Datanet Systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/splunk-uba-software-licensing.jpg\",\"datePublished\":\"2021-04-23T11:42:03+00:00\",\"dateModified\":\"2021-05-04T09:16:31+00:00\",\"description\":\"Splunk UBA (User Behavior Analytics) allows the elimination of unknown threats using advanced analysis technologies and Machine Learning.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/splunk-uba-software-licensing.jpg\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/splunk-uba-software-licensing.jpg\",\"width\":700,\"height\":394},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/splunk-uba\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NEWS AND EVENTS\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/category\\\/all-articles\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tendin\u021be \u00een industrie\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/tendinte-in-industrie\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Discover unknown threats with Splunk UBA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/8e0fc08f37652fac2a619b527cca0248\",\"name\":\"Diana Zaharia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g\",\"caption\":\"Diana Zaharia\"},\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/author\\\/diana-zaharia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Discover unknown threats with Splunk UBA &#8211; Datanet Systems","description":"Splunk UBA (User Behavior Analytics) allows the elimination of unknown threats using advanced analysis technologies and Machine Learning.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/en\/splunk-uba\/","og_locale":"en_US","og_type":"article","og_title":"Discover unknown threats with Splunk UBA &#8211; Datanet Systems","og_description":"Splunk UBA (User Behavior Analytics) allows the elimination of unknown threats using advanced analysis technologies and Machine Learning.","og_url":"https:\/\/datanets.ro\/en\/splunk-uba\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_published_time":"2021-04-23T11:42:03+00:00","article_modified_time":"2021-05-04T09:16:31+00:00","og_image":[{"width":700,"height":394,"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2021\/04\/splunk-uba-software-licensing.jpg","type":"image\/jpeg"}],"author":"Diana Zaharia","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Diana Zaharia","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datanets.ro\/en\/splunk-uba\/#article","isPartOf":{"@id":"https:\/\/datanets.ro\/en\/splunk-uba\/"},"author":{"name":"Diana Zaharia","@id":"https:\/\/datanets.ro\/#\/schema\/person\/8e0fc08f37652fac2a619b527cca0248"},"headline":"Discover unknown threats with Splunk UBA","datePublished":"2021-04-23T11:42:03+00:00","dateModified":"2021-05-04T09:16:31+00:00","mainEntityOfPage":{"@id":"https:\/\/datanets.ro\/en\/splunk-uba\/"},"wordCount":780,"publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"image":{"@id":"https:\/\/datanets.ro\/en\/splunk-uba\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2021\/04\/splunk-uba-software-licensing.jpg","keywords":["Cybersecurity","IT Security Architecture","Network Management","Network Management"],"articleSection":["Industry Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datanets.ro\/en\/splunk-uba\/","url":"https:\/\/datanets.ro\/en\/splunk-uba\/","name":"Discover unknown threats with Splunk UBA &#8211; Datanet Systems","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/en\/splunk-uba\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/en\/splunk-uba\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2021\/04\/splunk-uba-software-licensing.jpg","datePublished":"2021-04-23T11:42:03+00:00","dateModified":"2021-05-04T09:16:31+00:00","description":"Splunk UBA (User Behavior Analytics) allows the elimination of unknown threats using advanced analysis technologies and Machine Learning.","breadcrumb":{"@id":"https:\/\/datanets.ro\/en\/splunk-uba\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/en\/splunk-uba\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/en\/splunk-uba\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2021\/04\/splunk-uba-software-licensing.jpg","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2021\/04\/splunk-uba-software-licensing.jpg","width":700,"height":394},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/en\/splunk-uba\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"NEWS AND EVENTS","item":"https:\/\/datanets.ro\/en\/category\/all-articles\/"},{"@type":"ListItem","position":3,"name":"Tendin\u021be \u00een industrie","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/tendinte-in-industrie\/"},{"@type":"ListItem","position":4,"name":"Discover unknown threats with Splunk UBA"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]},{"@type":"Person","@id":"https:\/\/datanets.ro\/#\/schema\/person\/8e0fc08f37652fac2a619b527cca0248","name":"Diana Zaharia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g","caption":"Diana Zaharia"},"url":"https:\/\/datanets.ro\/en\/author\/diana-zaharia\/"}]}},"modified_by":"Diana Zaharia","_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/20332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=20332"}],"version-history":[{"count":8,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/20332\/revisions"}],"predecessor-version":[{"id":20358,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/20332\/revisions\/20358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/20321"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=20332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/categories?post=20332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/tags?post=20332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}