{"id":219995,"date":"2025-01-27T16:35:17","date_gmt":"2025-01-27T16:35:17","guid":{"rendered":"https:\/\/businesnewswire.com\/?p=84650"},"modified":"2025-01-27T16:35:17","modified_gmt":"2025-01-27T16:35:17","slug":"kristi-noems-approach-to-protecting-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/","title":{"rendered":"Kristi Noem\u2019s Approach to Protecting Critical Infrastructure"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-84651\" src=\"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png\" alt=\"noem\" width=\"669\" height=\"370\" srcset=\"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png 669w, https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem-300x166.png 300w\" sizes=\"(max-width: 669px) 100vw, 669px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In the complex landscape of national cybersecurity, the protection of critical infrastructure stands as a paramount concern. With Kristi Noem\u2019s confirmation as the Secretary of the Department of Homeland Security (DHS) in President Donald Trump\u2019s second term, there is a renewed focus on how cybersecurity policies, particularly those concerning critical infrastructure, might evolve. Noem\u2019s approach, informed by her tenure as South Dakota\u2019s Governor and her views expressed during her Senate confirmation hearings, suggests a redirection towards a more streamlined, mission-focused strategy for the Cybersecurity and Infrastructure Security Agency (CISA), which is housed within DHS.<\/span><\/p>\n<h2><b>CISA\u2019s Role in Critical Infrastructure Protection<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">CISA was established to safeguard the nation\u2019s critical infrastructure against cyber threats, a role it has been fulfilling since its inception in 2018. Critical infrastructure includes sectors like energy, finance, transportation, healthcare, and government facilities, all of which are increasingly reliant on digital systems. Noem\u2019s vision for CISA involves refocusing its efforts to ensure that it primarily deals with cybersecurity threats rather than broader issues like misinformation, which she has argued diverts resources from its core mission.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This refocusing could mean several things for the protection of critical infrastructure:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enhanced Technical Support: Noem has advocated for CISA to provide more robust technical expertise to federal agencies, state governments, and private companies. This could involve direct consulting, cybersecurity assessments, and the provision of tools tailored to protect critical infrastructure from cyber threats.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Coordinated Cyber Policy: Under her leadership, there could be a stronger emphasis on disseminating actionable threat intelligence and best practices. This would aim to create a unified front across different sectors to preempt cyberattacks before they disrupt essential services.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public-Private Synergy: Noem has highlighted the importance of leveraging private-public partnerships, suggesting that CISA should work more closely with industry leaders to fortify defenses. Given the private sector\u2019s significant role in managing much of the nation\u2019s critical infrastructure, this collaboration could lead to more dynamic and responsive cybersecurity strategies.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Kevin Gallagher, President of<\/span><a href=\"https:\/\/www.panurgy.com\/nj-cyber-security\/\"  rel=\"noopener\"><span style=\"font-weight: 400;\"> Panurgy IT Solutions<\/span><\/a><span style=\"font-weight: 400;\">, has emphasized the critical nature of such partnerships: \u201cCloud backup has protections that mitigate risks like that \u2014 and more so today than five years ago. It\u2019s important to have a backup in order to do that. If you get breached, you want to do away with whatever was a result of that attack and get back to business.\u201d<\/span><\/p>\n<h2><b>CMMC Compliance and Critical Infrastructure<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">One of the pivotal aspects of cybersecurity in the defense sector, which can be extrapolated to broader critical infrastructure protection, is the<\/span><a href=\"https:\/\/www.cyberuptive.com\/cmmc-compliance-services\/\"  rel=\"noopener\"><span style=\"font-weight: 400;\"> Cybersecurity Maturity Model Certification (CMMC)<\/span><\/a><span style=\"font-weight: 400;\">. Although initially developed for Department of Defense (DoD) contractors, CMMC\u2019s principles of cybersecurity hygiene and maturity can serve as a model for protecting other types of critical infrastructure:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CMMC as a Benchmark: CMMC establishes a tiered approach to cybersecurity compliance, which could be adapted for other sectors. Noem might push for similar frameworks where critical infrastructure providers must demonstrate cybersecurity maturity at different levels based on their role and the sensitivity of the data they handle.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pathfinder Assessment by DHS: Before Noem\u2019s appointment, DHS had already started looking into a compliance regime similar to CMMC for its contractors. With Noem at the helm, this initiative might be accelerated, ensuring that all DHS-related critical infrastructure, from border security to national emergency response teams, adheres to stringent cybersecurity standards.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integration into DHS Policy: The integration of CMMC-like compliance into broader DHS policies could mean that cybersecurity prerequisites become a standard part of contracting and operations within sectors like transportation security or emergency management, where cyber-resilience is crucial.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<h2><b>Challenges and Considerations<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">While Noem\u2019s approach sounds promising, several challenges and considerations must be addressed:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Balancing Security with Accessibility: Ensuring that cybersecurity measures do not overly restrict access to critical services or hamper emergency responses is a delicate balance. Overly stringent policies might lead to operational inefficiencies or even public backlash if perceived as overreaching.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Resource Allocation: Shifting CISA\u2019s focus back to core cybersecurity duties will require careful management of resources. There\u2019s a risk that in trying to be \u201cmore effective, smaller, and more nimble,\u201d as Noem suggested during her hearing, CISA might lose capacity for comprehensive threat analysis or response readiness.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Interagency Coordination: Protecting critical infrastructure isn\u2019t solely a CISA task; it involves coordination with other agencies like the FBI, CIA, and NSA. Noem\u2019s strategy must ensure seamless integration and information sharing to prevent any gaps in the national defense against cyber threats.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Private Sector Buy-In: While private-public partnerships are crucial, ensuring that private entities are willing to invest in the security measures required by new standards or frameworks akin to CMMC could be challenging. The cost of compliance might deter smaller organizations, potentially leaving vulnerabilities in the infrastructure chain.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<h2><b>Looking Forward<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Noem\u2019s leadership at DHS could mark a significant shift in how the U.S. approaches the cybersecurity of its critical infrastructure. By potentially adopting or adapting frameworks like CMMC, she aims for a scenario where every component of the nation\u2019s critical services is not just reactive but also proactively secure against cyber threats. This involves not only policy changes but also cultural shifts within organizations to prioritize cybersecurity at every level of operation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, the success of these initiatives will hinge on several factors:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Legislative Support: Any significant change in policy direction will require Congressional backing, especially concerning budgetary allocations and legal mandates for compliance.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Industry Engagement: Continuous dialogue with industries to tailor cybersecurity requirements that are both effective and feasible will be vital.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Education and Awareness: Increasing public and sector-specific awareness about cybersecurity\u2019s importance in maintaining national resilience against cyber threats.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Adaptive Strategies: Given the ever-evolving nature of cyber threats, strategies must remain adaptive, with mechanisms for regular review and update of security standards.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In conclusion, Kristi Noem\u2019s approach to protecting critical infrastructure through a more focused CISA and possibly through CMMC-like compliance models represents a strategic pivot towards a more secure national cybersecurity posture. However, the execution of these plans will demand a nuanced understanding of both the technological landscape and the socio-political environment in which these policies will be implemented.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the complex landscape of national cybersecurity, the protection of critical infrastructure stands as a paramount concern. With Kristi Noem\u2019s confirmation as the Secretary of the Department of Homeland Security (DHS) in President Donald Trump\u2019s second term, there is a renewed focus on how cybersecurity policies, particularly those concerning critical infrastructure, might evolve. Noem\u2019s approach,&#8230; <a href=\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":344,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[374],"tags":[],"class_list":["post-219995","post","type-post","status-publish","format-standard","hentry","category-ipsnews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Kristi Noem\u2019s Approach to Protecting Critical Infrastructure - Business<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kristi Noem\u2019s Approach to Protecting Critical Infrastructure - Business\" \/>\n<meta property=\"og:description\" content=\"In the complex landscape of national cybersecurity, the protection of critical infrastructure stands as a paramount concern. With Kristi Noem\u2019s confirmation as the Secretary of the Department of Homeland Security (DHS) in President Donald Trump\u2019s second term, there is a renewed focus on how cybersecurity policies, particularly those concerning critical infrastructure, might evolve. Noem\u2019s approach,... Continue Reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Business\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T16:35:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png\" \/>\n<meta name=\"author\" content=\"Busines Newswire\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Busines Newswire\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/\",\"url\":\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/\",\"name\":\"Kristi Noem\u2019s Approach to Protecting Critical Infrastructure - Business\",\"isPartOf\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png\",\"datePublished\":\"2025-01-27T16:35:17+00:00\",\"author\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/457ba41b64cc345c2ab68ac8092bd5e8\"},\"breadcrumb\":{\"@id\":\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#primaryimage\",\"url\":\"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png\",\"contentUrl\":\"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ipsnews.net\/business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kristi Noem\u2019s Approach to Protecting Critical Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ipsnews.net\/business\/#website\",\"url\":\"https:\/\/ipsnews.net\/business\/\",\"name\":\"Business\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ipsnews.net\/business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/457ba41b64cc345c2ab68ac8092bd5e8\",\"name\":\"Busines Newswire\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b21e185e011dc25167b5d0f8e948087219de9c5efa4828a2ee7e511b602d98d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b21e185e011dc25167b5d0f8e948087219de9c5efa4828a2ee7e511b602d98d?s=96&d=mm&r=g\",\"caption\":\"Busines Newswire\"},\"sameAs\":[\"https:\/\/businesnewswire.com\"],\"url\":\"https:\/\/ipsnews.net\/business\/author\/busines-newswire\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kristi Noem\u2019s Approach to Protecting Critical Infrastructure - Business","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Kristi Noem\u2019s Approach to Protecting Critical Infrastructure - Business","og_description":"In the complex landscape of national cybersecurity, the protection of critical infrastructure stands as a paramount concern. With Kristi Noem\u2019s confirmation as the Secretary of the Department of Homeland Security (DHS) in President Donald Trump\u2019s second term, there is a renewed focus on how cybersecurity policies, particularly those concerning critical infrastructure, might evolve. Noem\u2019s approach,... Continue Reading &rarr;","og_url":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/","og_site_name":"Business","article_published_time":"2025-01-27T16:35:17+00:00","og_image":[{"url":"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png","type":"","width":"","height":""}],"author":"Busines Newswire","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Busines Newswire","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/","url":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/","name":"Kristi Noem\u2019s Approach to Protecting Critical Infrastructure - Business","isPartOf":{"@id":"https:\/\/ipsnews.net\/business\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png","datePublished":"2025-01-27T16:35:17+00:00","author":{"@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/457ba41b64cc345c2ab68ac8092bd5e8"},"breadcrumb":{"@id":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#primaryimage","url":"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png","contentUrl":"https:\/\/businesnewswire.com\/wp-content\/uploads\/2025\/01\/noem.png"},{"@type":"BreadcrumbList","@id":"https:\/\/ipsnews.net\/business\/2025\/01\/27\/kristi-noems-approach-to-protecting-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ipsnews.net\/business\/"},{"@type":"ListItem","position":2,"name":"Kristi Noem\u2019s Approach to Protecting Critical Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/ipsnews.net\/business\/#website","url":"https:\/\/ipsnews.net\/business\/","name":"Business","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipsnews.net\/business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/457ba41b64cc345c2ab68ac8092bd5e8","name":"Busines Newswire","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b21e185e011dc25167b5d0f8e948087219de9c5efa4828a2ee7e511b602d98d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b21e185e011dc25167b5d0f8e948087219de9c5efa4828a2ee7e511b602d98d?s=96&d=mm&r=g","caption":"Busines Newswire"},"sameAs":["https:\/\/businesnewswire.com"],"url":"https:\/\/ipsnews.net\/business\/author\/busines-newswire\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/219995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/users\/344"}],"replies":[{"embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/comments?post=219995"}],"version-history":[{"count":3,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/219995\/revisions"}],"predecessor-version":[{"id":220021,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/219995\/revisions\/220021"}],"wp:attachment":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/media?parent=219995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/categories?post=219995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/tags?post=219995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}