{"id":5900,"date":"2024-11-27T17:33:06","date_gmt":"2024-11-27T17:33:06","guid":{"rendered":"http:\/\/vawlt.io\/?p=5900"},"modified":"2024-11-27T17:33:06","modified_gmt":"2024-11-27T17:33:06","slug":"drilling-down-on-dora-and-nis2","status":"publish","type":"post","link":"https:\/\/vawlt.io\/fr\/articles\/drilling-down-on-dora-and-nis2\/","title":{"rendered":"Drilling down on DORA and NIS-2: how can modern companies stay ahead of cyber threats?"},"content":{"rendered":"<div class=\"row\"  id=\"row-144240284\">\n\n\n\t<div id=\"col-59503973\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<p><span style=\"font-weight: 400;\">Every single day, new ransomware attacks make global headlines. The <\/span><a href=\"https:\/\/www.wsj.com\/articles\/crowdstrike-ends-turbulent-quarter-battered-but-standing-939b7809\"><span style=\"font-weight: 400;\">CrowdStrike<\/span><\/a><span style=\"font-weight: 400;\"> outage is a more recent example to show how one single mistake can lead to a catastrophic outcome.<\/span> <span style=\"font-weight: 400;\">A breathtaking array of organizations have fallen victim to these aggressive invasions. They\u00a0 are increasingly falling victim to infection by software that encrypts and locks files until a ransom is paid for their return.<\/span><\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n<div class=\"row\"  id=\"row-1575633611\">\n\n\n\t<div id=\"col-996733354\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_2142806257\">\n\t\t<a class=\"\" href=\"http:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/BBT_Vawlt_Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" >\t\t\t\t\t\t<div class=\"img-inner image-zoom box-shadow-1 dark\" style=\"margin:0px 0 0px 0px;\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"917\" height=\"379\" src=\"https:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29.png 917w, https:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29-300x124.png 300w, https:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29-768x317.png 768w, https:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29-18x7.png 18w\" sizes=\"auto, (max-width: 917px) 100vw, 917px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_2142806257 {\n  width: 66%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n<div class=\"row align-middle\"  id=\"row-1988322996\">\n\n\n\t<div id=\"col-1468601218\" class=\"col small-12 large-12 small-col-first\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<p><span style=\"font-weight: 400;\">While pressures mount due to the general digitalisation of societies as an on-going process, as well as geopolitical complexities all companies face, it is now obvious that the biggest challenges from a cyber security POV are caused by the developments in the field of artificial intelligence (AI). In fact, the global security platform, SoSafe, argues that everything changed in 2023 with the launch of ChatGPT by OpenAI. AI was meant to reach 300 million users in 2024 (according to SoSafe).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By 2030, that figure is meant to double.<\/span><span style=\"font-weight: 400;\"> Although AI offers a plethora of positive possibilities, it unfortunately also enhances the sophistication of malevolent uses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To try and match this ever growing, dynamic threat for companies, the EU has adopted regulations that require stricter security measures. These measures apply pressure to companies to protect themselves.\u00a0 Small wonder, then, that pressed between regulation and threat, global end-user spending on security and risk management is expected to reach USD 215 billion in 2024, an increase of 14.3% compared to 2023.<\/span><\/p>\n<h3>\u00a0<\/h3>\n<h3><b>What is NIS-2?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As of October 2024, the Network and Information Security Directive 2.0 (NIS-2), the EU&#8217;s new, mandatory cybersecurity directive, was implemented. It is of more wide-ranging application than DORA. Organizations in certain industries (financial services, energy, transport, and digital services sectors) must be seen to be taking appropriate cybersecurity measures. They also must instantly report significant incidents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The goal of NIS-2 is to strengthen resilience against cyber-attacks, and to help improve responsiveness in the event of security incidents by setting clear requirements for risk management and incident reporting.<\/span><\/p>\n<h3>\u00a0<\/h3>\n<h3><b>What is DORA?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">DORA (Digital Operational Resilience Act) focuses solely on the financial sector. DORA aims to ensure resilience to cyber-attacks. It summarizes the guidelines of the European Banking Authority in a concise framework to improve cyber security in this particular sector. DORA is limited to financial institutions.\u00a0<\/span><\/p>\n<h3>\u00a0<\/h3>\n<h3><b>When must companies implement the requirements?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The NIS 2 Directive is in force from October\u00a0 2024. The Digital Operational Resilience Act (DORA) is a regulation, i.e. a directly applicable European law, and will enter into force directly and unchanged in the member states in January 2025.<\/span><\/p>\n<h3>\u00a0<\/h3>\n<h3><b>Vawlt\u2019s cloud independence empowers organizations\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It would be delusional to think that cyber-attacks can be 100% prevented. No new regulation introduced to the world will achieve this. As a result, it\u2019s important that companies feel empowered that they can respond appropriately once an attack has taken place, and are able to minimize the damage in compliance with regulations. But how much cyber security is enough to comply with new requirements, and how can the cost be kept in control?<\/span><\/p>\n<p>\u00a0<\/p>\n<h3><b>A bulwark always starts with simple basics<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Being able to assess the danger, knowing what might come down the road of cyber risks is key. Planning ahead, making smart changes, putting strategies and processes into place and relying on powerful cyber-attack solutions is of utmost importance in order to improve protective barriers. IT-teams can proactively prepare for NIS-2 and DORA at an early stage. These considerations should include a strong strategy, state-of-the-art software solutions as well as the employment of a variety of tactics to increase the overall protection against ransomware attacks and other cyber threats.<\/span><\/p>\n<h3>\u00a0<\/h3>\n<h3><b>Operational resilience &#8211; more than just a watchword<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With data growing exponentially and cyber threats on the rise, today\u2019s organizations must be able to keep delivering critical operations in the face of disruptive incidents. In order to ensure this, key measures need to be in place. The interplay between early identification as well as thorough assessment and management of risks, an agile crisis management and a forward thinking business continuity plan all help to ensure \u2018business as usual\u2019. At Vawlt, operational resilience measures are paired with a simplified configuration and an overall\u00a0 transparent cloud management.<\/span><\/p>\n<h3>\u00a0<\/h3>\n<h3><b>Digging deeper: Vawlt\u2019s cloud independence &#8211; the true path to maximum control<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">What can be learnt from disasters like the CrowdStrike outage, the <\/span><a href=\"https:\/\/www.theregister.com\/2024\/09\/17\/alibaba_cloud_singapore_fire_recovery\/\"><span style=\"font-weight: 400;\">Alibaba cloud fire<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\"> or the <\/span><a href=\"https:\/\/www.unisuper.com.au\/about-us\/media-centre\/2024\/a-joint-statement-from-unisuper-and-google-cloud\"><span style=\"font-weight: 400;\">UniSuper<\/span><\/a><span style=\"font-weight: 400;\"> incident is that <\/span><span style=\"font-weight: 400;\">all suppliers, including cloud giants, can fail. Cloud-managed geo-replication isn\u2019t synonymous with comprehensive fault tolerance or resiliency. Why? Because geo-replication provides resiliency against events like natural disasters, but doesn\u2019t safeguard against cloud-level incidents. This is why part of Vawlt\u2019s approach is to encourage organizations that their <\/span><span style=\"font-weight: 400;\">measures to ensure independence, sovereignty, and business continuity are taken by themselves &#8211; completely independently of the guarantees provided by cloud service providers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vawlt proactively supports companies in taking advantage of the resources of the modern multi-cloud world. However, when it comes to independence and incident response, the company remains in the driving seat at all times.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vawlt\u2019s immutability and continuous snapshotting capabilities directly answer the ever-growing, dynamic ransomware challenge, no matter what kind of data, storage flavor, or underlying infrastructure. Moreover, IT decision-makers can define a retention policy for the files in each data volume. As a result, they can define a period when these files are still available for recovery, even if they\u2019re deleted.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vawlt also works highly cost-effectively: organizations don\u2019t need to make disruptive changes to their overall infrastructures in order to increase their level of ransomware protection. Especially in sectors that deal with sensitive data, e.g., in financial institutions, data protection and compliance are major subjects. Vawlt ensures that all archived data is stored in a multi-cloud environment, ensuring data availability and no downtimes &#8211; even in the event of one of the clouds going offline.<\/span><\/p>\n<h3>\u00a0<\/h3>\n<h3><b>Complying and enhancing &#8211; it needn\u2019t be a headache!<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In conclusion, this is clearly not the time for companies to complain about regulation overkill, even if it can be tiring to comply with a seemingly constant stream of new requirements that are linked to potential penalties. In the face of NIS-2 and DORA, IT decision-makers are best advised to go the extra mile. This means finding strong partners that can enhance their companies\u2019 existing data security strategies as well as their measures for operational resilience in a multi-cloud environment, to raise standards of security and compliance across the board.<\/span><\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>November 7, 2024 \u00b7 4 min read<\/p>","protected":false},"author":8,"featured_media":5903,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[21,568,571,572,14,565,5],"class_list":["post-5900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","tag-data","tag-data-protection","tag-dora","tag-nis2","tag-privacy","tag-supercloud","tag-vawlt"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Drilling down on DORA and NIS-2: how can modern companies stay ahead of cyber threats? | Vawlt Blog<\/title>\n<meta name=\"description\" content=\"\u201cDiscover how companies can navigate cybersecurity challenges with DORA and NIS-2 regulations. Learn how Vawlt empowers businesses with multi-cloud independence, operational resilience, and cost-effective ransomware protection for enhanced security and compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Drilling down on DORA and NIS-2: how can modern companies stay ahead of cyber threats? | Vawlt Blog\" \/>\n<meta property=\"og:description\" content=\"\u201cDiscover how companies can navigate cybersecurity challenges with DORA and NIS-2 regulations. Learn how Vawlt empowers businesses with multi-cloud independence, operational resilience, and cost-effective ransomware protection for enhanced security and compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"Vawlt\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/vawlt\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-27T17:33:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/site-temp.vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29.png\" \/>\n\t<meta property=\"og:image:width\" content=\"917\" \/>\n\t<meta property=\"og:image:height\" content=\"379\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ricardo Mendes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@vawltio\" \/>\n<meta name=\"twitter:site\" content=\"@vawltio\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ricardo Mendes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Drilling down on DORA and NIS-2: how can modern companies stay ahead of cyber threats? | Vawlt Blog","description":"\u201cDiscover how companies can navigate cybersecurity challenges with DORA and NIS-2 regulations. Learn how Vawlt empowers businesses with multi-cloud independence, operational resilience, and cost-effective ransomware protection for enhanced security and compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/","og_locale":"fr_FR","og_type":"article","og_title":"Drilling down on DORA and NIS-2: how can modern companies stay ahead of cyber threats? | Vawlt Blog","og_description":"\u201cDiscover how companies can navigate cybersecurity challenges with DORA and NIS-2 regulations. Learn how Vawlt empowers businesses with multi-cloud independence, operational resilience, and cost-effective ransomware protection for enhanced security and compliance.","og_url":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/","og_site_name":"Vawlt","article_publisher":"https:\/\/www.facebook.com\/vawlt","article_published_time":"2024-11-27T17:33:06+00:00","og_image":[{"width":917,"height":379,"url":"https:\/\/site-temp.vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29.png","type":"image\/png"}],"author":"Ricardo Mendes","twitter_card":"summary_large_image","twitter_creator":"@vawltio","twitter_site":"@vawltio","twitter_misc":{"\u00c9crit par":"Ricardo Mendes","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/#article","isPartOf":{"@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/"},"author":{"name":"Ricardo Mendes","@id":"https:\/\/site-temp.vawlt.io\/#\/schema\/person\/f470bb81577a2189575258f8eac7a33e"},"headline":"Drilling down on DORA and NIS-2: how can modern companies stay ahead of cyber threats?","datePublished":"2024-11-27T17:33:06+00:00","mainEntityOfPage":{"@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/"},"wordCount":1118,"publisher":{"@id":"https:\/\/site-temp.vawlt.io\/#organization"},"image":{"@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29.png","keywords":["Data","Data protection","DORA","NIS2","Privacy","Supercloud","Vawlt"],"articleSection":["Articles"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/","url":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/","name":"Drilling down on DORA and NIS-2: how can modern companies stay ahead of cyber threats? | Vawlt Blog","isPartOf":{"@id":"https:\/\/site-temp.vawlt.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/#primaryimage"},"image":{"@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29.png","datePublished":"2024-11-27T17:33:06+00:00","description":"\u201cDiscover how companies can navigate cybersecurity challenges with DORA and NIS-2 regulations. Learn how Vawlt empowers businesses with multi-cloud independence, operational resilience, and cost-effective ransomware protection for enhanced security and compliance.","breadcrumb":{"@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/#primaryimage","url":"https:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29.png","contentUrl":"https:\/\/vawlt.io\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-27-at-17.04.29.png","width":917,"height":379},{"@type":"BreadcrumbList","@id":"https:\/\/site-temp.vawlt.io\/articles\/drilling-down-on-dora-and-nis2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vawlt.io\/"},{"@type":"ListItem","position":2,"name":"Drilling down on DORA and NIS-2: how can modern companies stay ahead of cyber threats?"}]},{"@type":"WebSite","@id":"https:\/\/site-temp.vawlt.io\/#website","url":"https:\/\/site-temp.vawlt.io\/","name":"Vawlt","description":"Solution de stockage de donn\u00e9es multicloud qui simplifie la transition vers le cloud, am\u00e9liore les normes de s\u00e9curit\u00e9 et optimise l'utilisation des ressources de stockage.","publisher":{"@id":"https:\/\/site-temp.vawlt.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/site-temp.vawlt.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/site-temp.vawlt.io\/#organization","name":"Vawlt","url":"https:\/\/site-temp.vawlt.io\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/site-temp.vawlt.io\/#\/schema\/logo\/image\/","url":"http:\/\/vawlt.io\/wp-content\/uploads\/2021\/08\/logo_vawlt_business.png","contentUrl":"http:\/\/vawlt.io\/wp-content\/uploads\/2021\/08\/logo_vawlt_business.png","width":576,"height":92,"caption":"Vawlt"},"image":{"@id":"https:\/\/site-temp.vawlt.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/vawlt","https:\/\/x.com\/vawltio","https:\/\/www.linkedin.com\/company\/vawlt","https:\/\/www.youtube.com\/channel\/UCYzlYYg7j_07CFi8Be0eAMw"]},{"@type":"Person","@id":"https:\/\/site-temp.vawlt.io\/#\/schema\/person\/f470bb81577a2189575258f8eac7a33e","name":"Ricardo Mendes","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/site-temp.vawlt.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/91e28cb80e5aef6fa775c1d9d45848729f09dc2325d3a925f54c32a487ec589b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/91e28cb80e5aef6fa775c1d9d45848729f09dc2325d3a925f54c32a487ec589b?s=96&d=mm&r=g","caption":"Ricardo Mendes"}}]}},"_links":{"self":[{"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/posts\/5900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/comments?post=5900"}],"version-history":[{"count":3,"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/posts\/5900\/revisions"}],"predecessor-version":[{"id":5904,"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/posts\/5900\/revisions\/5904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/media\/5903"}],"wp:attachment":[{"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/media?parent=5900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/categories?post=5900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vawlt.io\/fr\/wp-json\/wp\/v2\/tags?post=5900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}