{"id":45583,"date":"2025-03-02T12:58:20","date_gmt":"2025-03-02T19:58:20","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=45583"},"modified":"2025-03-31T23:32:52","modified_gmt":"2025-04-01T05:32:52","slug":"tag-cyber-interview-die-bedrohungslandschaft-2025","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/","title":{"rendered":"TAG Cyber-Interview: Die Bedrohungslandschaft 2025"},"content":{"rendered":"\n<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default     \">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Videos<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">TAG Cyber Interview: The 2025 Threat Landscape<\/h1>\n\n\n<p><span style=\"font-weight: 400;\">The threat landscape is constantly evolving and impacting organizations across all industries. Hear Swimlane CISO, Michael Lyborg, and TAG Cyber CEO, Ed Amoroso, discuss:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">The acceleration of threats\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SLA expectations from customers and federal agencies<\/span><\/li>\n<\/ul>\n\n\n\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/un8gm80qv7.js\" async type=\"module\"><\/script><style>wistia-player[media-id='un8gm80qv7']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/un8gm80qv7\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"un8gm80qv7\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">You Might Also Be Interested in<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default     \">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69de8f490f9d9 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-ciso-ai-soc-automation-interview\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-CISO-Interview-TAG.png' class='img-fluid' alt='' title='OG CISO Interview TAG'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>TAG Cyber &amp; Swimlane CISO Interview: SOC AI Automation<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69de8f491173e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/security-operations-center-tools\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-14.png' class='img-fluid' alt='7 Essential Security Operations Center Tools for 2025' title='Masthead'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>7 Essential Security Operations Center Tools for 2025<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69de8f49133de bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/resources\/reports\/tag-cyber-top-5-ai-automation-sec-ops\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/TAG-Cyber-AI-Automation-Vendors.png' class='img-fluid' alt='Download the TAG Cyber Report, Top 5 AI Automation for SecOps Vendors, for a summary of the SOAR market evolution, vendor evaluation criteria, and more' title='TAG Cyber AI Automation Vendors'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Report<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>TAG Cyber: TOP 5 SecOps AI Automation Vendors<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":45586,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"Swimlane and TAG Cyber experts discuss the value of automation for modern CISOs. ","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"2024-02-26 08:29:32","event_end_date":"2024-02-26 08:29:32","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[105],"resource-topic":[219],"resource-industry":[],"blog-category":[],"class_list":["post-45583","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-videos","resource-topic-company-culture"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>TAG Cyber Interview 2025 Threat Landscape | Swimlane<\/title>\n<meta name=\"description\" content=\"Watch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/ressourcen\/videos\/bedrohungslandschaft-cyber-2025\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TAG Cyber Interview: The 2025 Threat Landscape\" \/>\n<meta property=\"og:description\" content=\"Watch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/ressourcen\/videos\/bedrohungslandschaft-cyber-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T05:32:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Watch this short video to hear Ed Amoroso, TAG Cyber CEO, and Mike Lyborg, Swimlane CISO, to hear their perspectives on the value (and critical nature) of automation and orchestration for the CISOWatch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/\",\"url\":\"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/\",\"name\":\"TAG Cyber Interview 2025 Threat Landscape | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png\",\"datePublished\":\"2025-03-02T19:58:20+00:00\",\"dateModified\":\"2025-04-01T05:32:52+00:00\",\"description\":\"Watch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TAG Cyber Interview: The 2025 Threat Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/de\/#website\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/de\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"TAG Cyber Interview 2025 Bedrohungslandschaft | Swimlane","description":"Sehen Sie sich dieses kurze Video an, um zu erfahren, wie die Cyberexperten von Swimlane und TAG dar\u00fcber sprechen, wie man mit der Bedrohungslandschaft von 2025 Schritt halten kann.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/ressourcen\/videos\/bedrohungslandschaft-cyber-2025\/","og_locale":"de_DE","og_type":"article","og_title":"TAG Cyber Interview: The 2025 Threat Landscape","og_description":"Watch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.","og_url":"https:\/\/swimlane.com\/de\/ressourcen\/videos\/bedrohungslandschaft-cyber-2025\/","og_site_name":"AI Security Automation","article_modified_time":"2025-04-01T05:32:52+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Watch this short video to hear Ed Amoroso, TAG Cyber CEO, and Mike Lyborg, Swimlane CISO, to hear their perspectives on the value (and critical nature) of automation and orchestration for the CISOWatch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/","url":"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/","name":"TAG Cyber Interview 2025 Bedrohungslandschaft | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png","datePublished":"2025-03-02T19:58:20+00:00","dateModified":"2025-04-01T05:32:52+00:00","description":"Sehen Sie sich dieses kurze Video an, um zu erfahren, wie die Cyberexperten von Swimlane und TAG dar\u00fcber sprechen, wie man mit der Bedrohungslandschaft von 2025 Schritt halten kann.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-2025-threat-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"TAG Cyber Interview: The 2025 Threat Landscape"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/45583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/45583\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/45586"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=45583"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=45583"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=45583"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=45583"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=45583"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=45583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}