{"id":5325,"date":"2024-05-21T11:22:21","date_gmt":"2024-05-21T10:22:21","guid":{"rendered":"https:\/\/www.calligo.io\/?p=5325"},"modified":"2024-05-28T13:48:32","modified_gmt":"2024-05-28T12:48:32","slug":"introducing-calligos-new-cybersecurity-risk-assessment-tool","status":"publish","type":"post","link":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/","title":{"rendered":"Introducing Calligo&#8217;s New Cybersecurity Risk Assessment Tool"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>In today&#8217;s evolving digital landscape, understanding and mitigating cybersecurity risks are paramount. With cyber threats becoming increasingly sophisticated, organizations need robust frameworks to protect their assets and ensure operational continuity. This is where the NIST Framework 2.0 comes into play. Developed by the National Institute of Standards and Technology (NIST), this framework provides a comprehensive approach to managing and mitigating cybersecurity risks, and we at Calligo are excited to announce the launch of our new Cybersecurity Risk Assessment tool that leverages this powerful framework.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"https:\/\/www.calligo.io\/cyber-security-assessment\/\">Take the Assessment<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>What&#8217;s New in the NIST Framework 2.0?<\/strong><\/h2>\n\n\n\n<p>The NIST Cybersecurity Framework 2.0 builds upon its predecessor, enhancing its usability and effectiveness. Here are some key updates:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Expanded Framework Core:<\/strong> The Core now includes additional categories and subcategories to address emerging risks and technologies, providing a more detailed roadmap for cybersecurity practices.<\/li>\n\n\n\n<li><strong>Improved Governance:<\/strong> Emphasizing the importance of governance, the updated framework incorporates a new &#8220;Govern&#8221; function. This function establishes an enterprise risk management strategy, highlighting roles, responsibilities, policies, procedures, and oversight necessary for effective cybersecurity management.<\/li>\n\n\n\n<li><strong>Enhanced Implementation Guidance:<\/strong> With more detailed implementation examples, the Framework 2.0 helps organizations of all sizes and industries apply the core principles in practical, actionable ways.<\/li>\n\n\n\n<li><strong>Greater Emphasis on Supply Chain Risk Management:<\/strong> Recognizing the growing interdependence of organizations, the framework includes more robust guidelines for managing supply chain cybersecurity risks.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Why Use Calligo&#8217;s Cybersecurity Risk Assessment Tool?<\/strong><\/h2>\n\n\n\n<p>At Calligo, we understand that maintaining a strong cybersecurity posture is critical for the success and security of any organization. Our new Cybersecurity Risk Assessment tool is designed to help you navigate the complexities of cybersecurity using the NIST Framework 2.0. Here&#8217;s why you should take advantage of our free, comprehensive tool:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Identify Vulnerabilities:<\/strong> Our tool uses the structured methodology of the NIST Framework 2.0 to help you identify gaps and vulnerabilities in your current cybersecurity posture.<\/li>\n\n\n\n<li><strong>Prioritize Resources:<\/strong> By mapping out your cybersecurity landscape, our tool assists in prioritizing resources and efforts where they are needed most, ensuring you make the most impactful improvements.<\/li>\n\n\n\n<li><strong>Implement Effective Controls:<\/strong> With detailed insights and actionable recommendations, our tool helps you implement effective controls to mitigate identified risks and enhance your overall cybersecurity defenses.<\/li>\n\n\n\n<li><strong>Align with Best Practices:<\/strong> Leveraging the latest NIST guidelines, our tool ensures that your cybersecurity practices are aligned with industry standards and best practices, giving you confidence in your security measures.<\/li>\n\n\n\n<li><strong>Facilitate Decision-Making:<\/strong> The new Govern function in the NIST Framework 2.0 is integral to our tool, aiding in the establishment of a comprehensive risk management strategy. This helps in making informed decisions and enhancing accountability and efficiency within your organization.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Get Started Today<\/strong><\/h2>\n\n\n\n<p>In a world where cyber threats are ever-evolving, it is crucial to stay ahead with the right tools and strategies. Calligo&#8217;s new Cybersecurity Risk Assessment tool is free to use and provides a comprehensive evaluation of your organization&#8217;s cybersecurity posture based on the latest NIST Framework 2.0.<\/p>\n\n\n\n<p>Take the first step towards a more secure future. Visit our website to access the tool and start identifying and mitigating your cybersecurity risks today. With Calligo by your side, you can confidently navigate the digital landscape and protect what matters most.<\/p>\n\n\n\n<p><br>For more comprehensive insights into our cybersecurity packages, <a href=\"https:\/\/www.calligo.io\/services\/user-device-security\/\">visit https:\/\/www.calligo.io<\/a><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s evolving digital landscape, understanding and mitigating cybersecurity risks are paramount. With cyber threats becoming increasingly sophisticated, organizations need robust frameworks to protect their assets and ensure operational continuity. This is where the NIST Framework 2.0 comes into play. Developed by the National Institute of Standards and Technology (NIST), this framework provides a comprehensive [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":5326,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[168,121],"tags":[],"post_format_type":[96,40],"class_list":["post-5325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-glossary"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIST Framework 2.0 Online Cybersecurity Risk Assessment<\/title>\n<meta name=\"description\" content=\"Calligo&#039;s new Cybersecurity Risk Assessment tool provides a comprehensive evaluation of your organization&#039;s cybersecurity posture based on the latest NIST Framework 2.0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST Framework 2.0 Online Cybersecurity Risk Assessment\" \/>\n<meta property=\"og:description\" content=\"Calligo&#039;s new Cybersecurity Risk Assessment tool provides a comprehensive evaluation of your organization&#039;s cybersecurity posture based on the latest NIST Framework 2.0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"Calligo\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-21T10:22:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-28T12:48:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1480\" \/>\n\t<meta property=\"og:image:height\" content=\"1480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cynthia Hoza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:site\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cynthia Hoza\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/\"},\"author\":{\"name\":\"Cynthia Hoza\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f\"},\"headline\":\"Introducing Calligo&#8217;s New Cybersecurity Risk Assessment Tool\",\"datePublished\":\"2024-05-21T10:22:21+00:00\",\"dateModified\":\"2024-05-28T12:48:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/\"},\"wordCount\":537,\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg\",\"articleSection\":[\"Cyber Security\",\"Glossary\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/\",\"url\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/\",\"name\":\"NIST Framework 2.0 Online Cybersecurity Risk Assessment\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg\",\"datePublished\":\"2024-05-21T10:22:21+00:00\",\"dateModified\":\"2024-05-28T12:48:32+00:00\",\"description\":\"Calligo's new Cybersecurity Risk Assessment tool provides a comprehensive evaluation of your organization's cybersecurity posture based on the latest NIST Framework 2.0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#primaryimage\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg\",\"width\":1480,\"height\":1480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.calligo.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introducing Calligo&#8217;s New Cybersecurity Risk Assessment Tool\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.calligo.io\/#website\",\"url\":\"https:\/\/www.calligo.io\/\",\"name\":\"Calligo\",\"description\":\"Building value through data\",\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.calligo.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.calligo.io\/#organization\",\"name\":\"Calligo\",\"url\":\"https:\/\/www.calligo.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Calligo\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/calligocloud\",\"https:\/\/www.linkedin.com\/company\/calligo-limited\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f\",\"name\":\"Cynthia Hoza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g\",\"caption\":\"Cynthia Hoza\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIST Framework 2.0 Online Cybersecurity Risk Assessment","description":"Calligo's new Cybersecurity Risk Assessment tool provides a comprehensive evaluation of your organization's cybersecurity posture based on the latest NIST Framework 2.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/","og_locale":"en_GB","og_type":"article","og_title":"NIST Framework 2.0 Online Cybersecurity Risk Assessment","og_description":"Calligo's new Cybersecurity Risk Assessment tool provides a comprehensive evaluation of your organization's cybersecurity posture based on the latest NIST Framework 2.0","og_url":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/","og_site_name":"Calligo","article_published_time":"2024-05-21T10:22:21+00:00","article_modified_time":"2024-05-28T12:48:32+00:00","og_image":[{"width":1480,"height":1480,"url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg","type":"image\/jpeg"}],"author":"Cynthia Hoza","twitter_card":"summary_large_image","twitter_creator":"@calligocloud","twitter_site":"@calligocloud","twitter_misc":{"Written by":"Cynthia Hoza","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#article","isPartOf":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/"},"author":{"name":"Cynthia Hoza","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f"},"headline":"Introducing Calligo&#8217;s New Cybersecurity Risk Assessment Tool","datePublished":"2024-05-21T10:22:21+00:00","dateModified":"2024-05-28T12:48:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/"},"wordCount":537,"publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"image":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg","articleSection":["Cyber Security","Glossary"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/","url":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/","name":"NIST Framework 2.0 Online Cybersecurity Risk Assessment","isPartOf":{"@id":"https:\/\/www.calligo.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#primaryimage"},"image":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg","datePublished":"2024-05-21T10:22:21+00:00","dateModified":"2024-05-28T12:48:32+00:00","description":"Calligo's new Cybersecurity Risk Assessment tool provides a comprehensive evaluation of your organization's cybersecurity posture based on the latest NIST Framework 2.0","breadcrumb":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#primaryimage","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/Packshot-02.jpg","width":1480,"height":1480},{"@type":"BreadcrumbList","@id":"https:\/\/www.calligo.io\/insights\/glossary\/introducing-calligos-new-cybersecurity-risk-assessment-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.calligo.io\/"},{"@type":"ListItem","position":2,"name":"Introducing Calligo&#8217;s New Cybersecurity Risk Assessment Tool"}]},{"@type":"WebSite","@id":"https:\/\/www.calligo.io\/#website","url":"https:\/\/www.calligo.io\/","name":"Calligo","description":"Building value through data","publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.calligo.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.calligo.io\/#organization","name":"Calligo","url":"https:\/\/www.calligo.io\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","width":1200,"height":630,"caption":"Calligo"},"image":{"@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/calligocloud","https:\/\/www.linkedin.com\/company\/calligo-limited\/"]},{"@type":"Person","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f","name":"Cynthia Hoza","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g","caption":"Cynthia Hoza"}}]}},"_links":{"self":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/5325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/comments?post=5325"}],"version-history":[{"count":0,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/5325\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media\/5326"}],"wp:attachment":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media?parent=5325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/categories?post=5325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/tags?post=5325"},{"taxonomy":"post_format_type","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/post_format_type?post=5325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}