{"id":51798,"date":"2025-11-17T09:49:02","date_gmt":"2025-11-17T16:49:02","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=51798"},"modified":"2025-11-17T13:32:49","modified_gmt":"2025-11-17T20:32:49","slug":"entrevista-sobre-ataque-cibernetico-ia-encontra-defesa-automatizada-por-ia","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/","title":{"rendered":"Entrevista da TAG Cyber: IA ofensiva encontra defesa automatizada por IA"},"content":{"rendered":"\n<section class=\"bs-section bs-section-2895eb64f0b0f2eb1093772f2f54b4dc1e4c237a bs-section---default bs-section--common-header-with-form bs-section--common-marketo-form  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default     \">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Videos<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">TAG Cyber Interview: Offensive AI Meets AI Automated Defense<\/h1>\n\n\n<p><span style=\"font-weight: 400;\">Cyber threats are becoming increasingly sophisticated due to the advancement of AI. This video examines the importance of adopting an offensive mindset to construct robust defenses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hear from TAG Cyber CEO Ed Amoroso and Swimlane CISO Michael Lyborg to learn the critical role AI automation plays in rapidly creating and running security testing to find vulnerabilities before attackers do<\/span><\/p>\n\n\n\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/l67ev0rht3.js\" async type=\"module\"><\/script><style>wistia-player[media-id='l67ev0rht3']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/l67ev0rht3\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"l67ev0rht3\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">You Might Also Be Interested in<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default     \">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d7cec98754a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/resources\/videos\/resources\/videos\/tag-cyber-ai-secops-interview\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/YT-AI-in-SecOps-with-Swimlane-.webp' class='img-fluid' alt='TAG Cyber AI in SecOps Interview with Swimlane CISO' title='YT-AI-in-SecOps-with-Swimlane-'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>TAG Cyber Full Interview on AI in SecOps<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d7cec988fb7 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/resources\/case-studies\/compliance-ot\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/AI-Automation-Drives-Compliance-for-Utility-Company-1.png' class='img-fluid' alt='' title='AI Automation Drives Compliance for Utility Company (1)'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Case Studies<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>AI Automation Drives Compliance for Utility Company<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d7cec98a512 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-ai-risk-opportunity-interview\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/AIRiskorOpportunity.webp' class='img-fluid' alt='AI in Cyber' title='AIRiskorOpportunity'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>TAG Cyber Interview: AI: Risk, Opportunity, Both? A CISO&#8217;s View<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":96,"featured_media":51799,"template":"","meta":{"_acf_changed":false,"show_custom_date":true,"custom_date":"2025-11-09T19:20:26.871Z","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"AI Automated Defense","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"2024-02-26 08:29:32","event_end_date":"2024-02-26 08:29:32","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[105],"resource-topic":[215],"resource-industry":[],"blog-category":[],"class_list":["post-51798","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-videos","resource-topic-ai"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>TAG Cyber Offensive AI Meets AI Automated Defense | Swimlane<\/title>\n<meta name=\"description\" content=\"This video examines the importance of adopting an offensive mindset to construct robust defenses. Learn the critical role AI and automation plays.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/recursos\/videos\/entrevista-sobre-ataque-cibernetico-ia-encontra-defesa-automatizada-por-ia\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TAG Cyber Interview: Offensive AI Meets AI Automated Defense\" \/>\n<meta property=\"og:description\" content=\"This video explores the fundamental need for junior analysts to collaborate with AI and manage its risks across the entire company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/recursos\/videos\/entrevista-sobre-ataque-cibernetico-ia-encontra-defesa-automatizada-por-ia\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T20:32:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Offensive-AI-Meets-AI-Automated-Defense.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"This video explores the fundamental need for junior analysts to collaborate with AI and manage its risks across the entire company.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/\",\"url\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/\",\"name\":\"TAG Cyber Offensive AI Meets AI Automated Defense | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Offensive-AI-Meets-AI-Automated-Defense.webp\",\"datePublished\":\"2025-11-17T16:49:02+00:00\",\"dateModified\":\"2025-11-17T20:32:49+00:00\",\"description\":\"This video examines the importance of adopting an offensive mindset to construct robust defenses. Learn the critical role AI and automation plays.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Offensive-AI-Meets-AI-Automated-Defense.webp\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Offensive-AI-Meets-AI-Automated-Defense.webp\",\"width\":1280,\"height\":720,\"caption\":\"AI Automated Defense\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TAG Cyber Interview: Offensive AI Meets AI Automated Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/pt\/#website\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"TAG: Ataque Cibern\u00e9tico com IA Encontra Defesa Automatizada por IA | Swimlane","description":"Este v\u00eddeo examina a import\u00e2ncia de adotar uma mentalidade ofensiva para construir defesas robustas. Aprenda o papel crucial que a IA e a automa\u00e7\u00e3o desempenham.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/recursos\/videos\/entrevista-sobre-ataque-cibernetico-ia-encontra-defesa-automatizada-por-ia\/","og_locale":"pt_PT","og_type":"article","og_title":"TAG Cyber Interview: Offensive AI Meets AI Automated Defense","og_description":"This video explores the fundamental need for junior analysts to collaborate with AI and manage its risks across the entire company.","og_url":"https:\/\/swimlane.com\/pt\/recursos\/videos\/entrevista-sobre-ataque-cibernetico-ia-encontra-defesa-automatizada-por-ia\/","og_site_name":"AI Security Automation","article_modified_time":"2025-11-17T20:32:49+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Offensive-AI-Meets-AI-Automated-Defense.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_description":"This video explores the fundamental need for junior analysts to collaborate with AI and manage its risks across the entire company.","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/","url":"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/","name":"TAG: Ataque Cibern\u00e9tico com IA Encontra Defesa Automatizada por IA | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Offensive-AI-Meets-AI-Automated-Defense.webp","datePublished":"2025-11-17T16:49:02+00:00","dateModified":"2025-11-17T20:32:49+00:00","description":"Este v\u00eddeo examina a import\u00e2ncia de adotar uma mentalidade ofensiva para construir defesas robustas. Aprenda o papel crucial que a IA e a automa\u00e7\u00e3o desempenham.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Offensive-AI-Meets-AI-Automated-Defense.webp","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Offensive-AI-Meets-AI-Automated-Defense.webp","width":1280,"height":720,"caption":"AI Automated Defense"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/tag-cyber-offensive-ai-meets-ai-automated-defense-interview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"TAG Cyber Interview: Offensive AI Meets AI Automated Defense"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/51798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/96"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/51798\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/51799"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=51798"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=51798"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=51798"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=51798"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=51798"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=51798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}