{"id":26098,"date":"2025-05-22T08:11:46","date_gmt":"2025-05-22T08:11:46","guid":{"rendered":"https:\/\/c1mdev.com\/c1m.ai\/?p=26098"},"modified":"2025-05-22T08:12:02","modified_gmt":"2025-05-22T08:12:02","slug":"ai-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/c1mdev.com\/c1m.ai\/ai-in-cybersecurity\/","title":{"rendered":"Why CEOs Are Investing in AI in Cybersecurity"},"content":{"rendered":"<p><b><span data-contrast=\"auto\">There\u2019s no question that AI has changed the cybersecurity conversation<\/span><\/b><span data-contrast=\"auto\">. What began as a way to automate tasks such as log reviews and anomaly detection has evolved into something far more complex. Today\u2019s systems aren\u2019t just analyzing data. <\/span><b><span data-contrast=\"auto\">They communicate, make decisions, and coordinate actions independently.\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">As AI in cybersecurity is changing, many CEOs are beginning to question whether their current defenses are truly equipped for today\u2019s evolving digital threats. <\/span><\/b><span data-contrast=\"auto\">Are your current tools built to handle AI systems that act independently? How do you monitor agent-to-agent behavior? What controls exist around what your AI can share &#8212; or, even more concerning, what it might-accidentally expose?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At <\/span><span data-contrast=\"none\">C1M<\/span><span data-contrast=\"auto\">, we understand the challenges of securing AI systems that are becoming more autonomous, interconnected, and deeply embedded into core operations.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Today, we\u2019ll discover where AI is already integrated into cybersecurity, what\u2019s changing with the rise of agentic AI, and how we can help companies adapt securely and effectively.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">What is AI\u2019s Expanding Role in Cybersecurity?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Artificial Intelligence (AI) has become integral to modern cybersecurity strategies, offering capabilities far beyond traditional methods. Its applications span various domains and can enhance security measures for efficiency and effectiveness. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Common AI in cybersecurity applications include<\/span><\/b><span data-contrast=\"auto\">:\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Threat Detection and Prevention<\/span><\/b><span data-contrast=\"auto\">: AI systems can analyze vast real-time network traffic and user behavior. They can also identify anomalies that may indicate potential threats. By establishing behavioral baselines, these systems detect subtle deviations and flag incidents faster than traditional tools.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Phishing and Malware Detection<\/span><\/b><span data-contrast=\"auto\">: Machine learning models trained on large datasets can recognize common phishing and malicious code indicators, even as tactics evolve. This dynamic analysis allows consistent protection across email, cloud, and endpoint environments.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Authentication and Access Control<\/span><\/b><span data-contrast=\"auto\">: AI now supports adaptive authentication using behavioral signals like typing cadence, geolocation, and session history to evaluate whether access attempts align with user norms. This helps reduce account takeover risks.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Vulnerability Management: <\/span><\/b><span data-contrast=\"auto\">AI helps teams focus by sorting and scoring vulnerabilities based on the likelihood of exploitation, not just severity. This makes remediation cycles more effective, especially when security teams are stretched thin.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Automated Incident Response:<\/span><\/b><span data-contrast=\"auto\"> AI can support incident response by automatically isolating compromised devices, flagging suspicious sessions, or escalating unusual activity, often before an analyst receives an alert.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">These capabilities are already in use across many enterprise security teams. <\/span><\/b><span data-contrast=\"auto\">For cybersecurity leaders considering AI investment, the business case is compelling and increasingly difficult to ignore.\u00a0 According to <\/span><a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">IBM\u2019s 2024 <\/span><i><span data-contrast=\"none\">Cost of a Data Breach Report<\/span><\/i><\/a><span data-contrast=\"auto\">, organizations implementing AI and automation in their security strategy saw an average savings of $1.76 million per breach. In addition, they resolved incidents 108 days faster than those without. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Balancing AI Innovation with New Security Risks in SecOps<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p aria-level=\"2\"><b><span data-contrast=\"none\">These figures highlight why many cybersecurity organizations are accelerating AI integration across their SecOps workflows.<\/span><\/b><span data-contrast=\"none\"> However, with the deployment of more autonomous models, particularly within detection, response, and SOAR platforms, assessing more than just performance improvements becomes critical.\u00a0<\/span><b><span data-contrast=\"none\"> Interoperability is also necessary, considering the expanded attack surface and the coordination risks introduced by inner-agent communication and model.\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Is Inner-Agent Communication Emerging as the Next Frontier in Cybersecurity?\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">As AI becomes more deeply embedded in cybersecurity operations, one area gaining attention is <\/span><b><span data-contrast=\"auto\">inner-agent communication<\/span><\/b><span data-contrast=\"auto\">. This refers to\u00a0 <\/span><b><span data-contrast=\"auto\">the autonomous exchange of information between AI systems as they coordinate and execute tasks. <\/span><\/b><span data-contrast=\"auto\">This capability enhances efficiency and responsiveness across distributed environments. However, it also introduces complexity, as these agents may interact in difficult ways to audit, govern, or secure without proper oversight.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Without proper guardrails in place, internal agent-to-agent communication can introduce <\/span><b><span data-contrast=\"auto\">a new set of risks, including:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Avoiding established security review processes<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Sharing more information than intended between systems<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Being manipulated by external prompts or oppositional inputs<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">These aren\u2019t theoretical concerns. They\u2019re increasingly relevant as <a href=\"https:\/\/c1mdev.com\/c1m.ai\/anatomy-of-an-ai-agent-how-ai-processes-information-and-learns\/\" target=\"_blank\" rel=\"noopener\">AI agents<\/a> assume roles in environments where speed, accuracy, and data sensitivity converge.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Why Aren\u2019t Traditional Firewalls Enough?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Another important development in AI governance is the rise of <\/span><b><span data-contrast=\"auto\">AI firewalls<\/span><\/b><span data-contrast=\"auto\">\u2014specialized systems designed to monitor, filter, and control what goes <\/span><i><span data-contrast=\"auto\">into<\/span><\/i><span data-contrast=\"auto\"> and <\/span><i><span data-contrast=\"auto\">comes out of<\/span><\/i><span data-contrast=\"auto\"> AI models.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Traditional firewalls protect systems based on ports, protocols, and IP addresses. However, AI models operate differently. They generate content, respond to user prompts, and occasionally learn from inputs. That creates <b>two critical requirements:<\/b><\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Input protection<\/span><\/b><span data-contrast=\"auto\">: Safeguarding against prompt injections or attempts to manipulate AI behavior.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Output filtering<\/span><\/b><span data-contrast=\"auto\">: Preventing the AI from sharing sensitive data, hallucinated claims, or non-compliant language.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">AI firewalls represent a critical next step for cybersecurity firms developing internal AI tools or those offering AI-enabled services to clients.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Evolving Cybersecurity Strategies for the Agentic AI Era\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">Agentic AI<\/span><\/b><span data-contrast=\"auto\"> refers to systems that can pursue goals, adapt based on feedback, and act independently.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">In cybersecurity, this includes AI agents that monitor systems, escalate incidents, or coordinate with other tools to triage alerts.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The advantage is speed, but increased autonomy reshapes the entire risk landscape.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Agentic AI requires:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Auditable behavior<\/span><\/b><span data-contrast=\"auto\">: Security teams must be able to understand and trace how decisions are made.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Defined constraints<\/span><\/b><span data-contrast=\"auto\">: AI agents need clear parameters around what to do and when to escalate. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Cross-functional input<\/span><\/b><span data-contrast=\"auto\">: Security, engineering, and compliance must collaborate on how these AI agents are deployed and managed.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">As agentic AI becomes more embedded in daily cybersecurity workflows, it introduces a new operational reality<\/span><\/b><span data-contrast=\"auto\">. Traditional security practices must evolve to account for independent actions, contextual judgment, and complex system interactions. Getting ahead of this shift requires clear governance, intentional design, and close collaboration across technical and non-technical teams.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Optimizing AI in Cybersecurity for the Agentic Era with C1M<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">AI is redefining the way cybersecurity operates. <\/span><\/b><span data-contrast=\"auto\">However, as systems become simultaneously more autonomous and interconnected, traditional tools and frameworks must evolve. From inner-agent communication to AI firewalls and governance, the next phase of security isn\u2019t limited to protecting infrastructure. It\u2019s about protecting artificial intelligence. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">At C1M, we help organizations strategically consider <a href=\"https:\/\/c1mdev.com\/c1m.ai\/ai-readiness-and-strategy\/\" target=\"_blank\" rel=\"noopener\">how AI fits<\/a> into their broader cybersecurity vision<\/span><\/b><span data-contrast=\"auto\">. Whether you\u2019re just starting to explore AI\u00a0 or actively integrating autonomous tools, we can work with your team to build clarity, alignment, and confidence about what\u2019s next.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><em>As cybersecurity transforms, your approach must stay one step ahead.\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/c1mdev.com\/c1m.ai\/contact\/\">Contact us<\/a> today to see how your organization can lead, not just adapt, in this next phase of AI in cybersecurity.\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s no question that AI has changed the cybersecurity conversation. What began as a way to automate tasks such as log reviews and anomaly detection&#8230;<\/p>\n","protected":false},"author":1,"featured_media":26099,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1172],"tags":[],"class_list":["post-26098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence"],"_links":{"self":[{"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/posts\/26098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/comments?post=26098"}],"version-history":[{"count":2,"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/posts\/26098\/revisions"}],"predecessor-version":[{"id":26101,"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/posts\/26098\/revisions\/26101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/media\/26099"}],"wp:attachment":[{"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/media?parent=26098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/categories?post=26098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/c1mdev.com\/c1m.ai\/wp-json\/wp\/v2\/tags?post=26098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}