{"id":45583,"date":"2025-03-02T12:58:20","date_gmt":"2025-03-02T19:58:20","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=45583"},"modified":"2025-03-31T23:32:52","modified_gmt":"2025-04-01T05:32:52","slug":"entretien-sur-la-cybersecurite-et-le-paysage-des-menaces-de-2025","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/","title":{"rendered":"Entretien avec TAG Cyber\u00a0: Le paysage des menaces en 2025"},"content":{"rendered":"\n<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default     \">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Videos<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">TAG Cyber Interview: The 2025 Threat Landscape<\/h1>\n\n\n<p><span style=\"font-weight: 400;\">The threat landscape is constantly evolving and impacting organizations across all industries. Hear Swimlane CISO, Michael Lyborg, and TAG Cyber CEO, Ed Amoroso, discuss:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">The acceleration of threats\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SLA expectations from customers and federal agencies<\/span><\/li>\n<\/ul>\n\n\n\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/un8gm80qv7.js\" async type=\"module\"><\/script><style>wistia-player[media-id='un8gm80qv7']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/un8gm80qv7\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"un8gm80qv7\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">You Might Also Be Interested in<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default     \">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69de90ddc22e8 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-ciso-ai-soc-automation-interview\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-CISO-Interview-TAG.png' class='img-fluid' alt='' title='OG CISO Interview TAG'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>TAG Cyber &amp; Swimlane CISO Interview: SOC AI Automation<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69de90ddc3f28 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/security-operations-center-tools\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-14.png' class='img-fluid' alt='7 Essential Security Operations Center Tools for 2025' title='Masthead'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>7 Essential Security Operations Center Tools for 2025<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69de90ddc5a4d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/resources\/reports\/tag-cyber-top-5-ai-automation-sec-ops\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/TAG-Cyber-AI-Automation-Vendors.png' class='img-fluid' alt='Download the TAG Cyber Report, Top 5 AI Automation for SecOps Vendors, for a summary of the SOAR market evolution, vendor evaluation criteria, and more' title='TAG Cyber AI Automation Vendors'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Report<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>TAG Cyber: TOP 5 SecOps AI Automation Vendors<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":45586,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"Swimlane and TAG Cyber experts discuss the value of automation for modern CISOs. ","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"2024-02-26 08:29:32","event_end_date":"2024-02-26 08:29:32","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[105],"resource-topic":[219],"resource-industry":[],"blog-category":[],"class_list":["post-45583","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-videos","resource-topic-company-culture"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>TAG Cyber Interview 2025 Threat Landscape | Swimlane<\/title>\n<meta name=\"description\" content=\"Watch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/ressources\/videos\/cybersecurite-et-paysage-des-menaces-a-lhorizon-2025\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TAG Cyber Interview: The 2025 Threat Landscape\" \/>\n<meta property=\"og:description\" content=\"Watch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/ressources\/videos\/cybersecurite-et-paysage-des-menaces-a-lhorizon-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T05:32:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Watch this short video to hear Ed Amoroso, TAG Cyber CEO, and Mike Lyborg, Swimlane CISO, to hear their perspectives on the value (and critical nature) of automation and orchestration for the CISOWatch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/\",\"url\":\"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/\",\"name\":\"TAG Cyber Interview 2025 Threat Landscape | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png\",\"datePublished\":\"2025-03-02T19:58:20+00:00\",\"dateModified\":\"2025-04-01T05:32:52+00:00\",\"description\":\"Watch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TAG Cyber Interview: The 2025 Threat Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/fr\/#website\",\"url\":\"https:\/\/swimlane.com\/fr\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/fr\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"TAG Cyber Interview 2025 : Paysage des menaces | Swimlane","description":"Regardez cette courte vid\u00e9o pour entendre les experts de Swimlane et de TAG Cyber discuter de la fa\u00e7on de suivre le rythme des menaces en 2025.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/ressources\/videos\/cybersecurite-et-paysage-des-menaces-a-lhorizon-2025\/","og_locale":"fr_FR","og_type":"article","og_title":"TAG Cyber Interview: The 2025 Threat Landscape","og_description":"Watch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.","og_url":"https:\/\/swimlane.com\/fr\/ressources\/videos\/cybersecurite-et-paysage-des-menaces-a-lhorizon-2025\/","og_site_name":"AI Security Automation","article_modified_time":"2025-04-01T05:32:52+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Watch this short video to hear Ed Amoroso, TAG Cyber CEO, and Mike Lyborg, Swimlane CISO, to hear their perspectives on the value (and critical nature) of automation and orchestration for the CISOWatch this short video to hear Swimlane and TAG Cyber experts discuss how to keep pace with the 2025 threat landscape.","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/","url":"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/","name":"TAG Cyber Interview 2025 : Paysage des menaces | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png","datePublished":"2025-03-02T19:58:20+00:00","dateModified":"2025-04-01T05:32:52+00:00","description":"Regardez cette courte vid\u00e9o pour entendre les experts de Swimlane et de TAG Cyber discuter de la fa\u00e7on de suivre le rythme des menaces en 2025.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/TAG-4-The-2025-Threat-Landscape.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/tag-cyber-2025-threat-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"TAG Cyber Interview: The 2025 Threat Landscape"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/45583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/45583\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/45586"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=45583"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=45583"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=45583"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=45583"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=45583"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=45583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}