{"id":15186,"date":"2026-03-12T11:16:02","date_gmt":"2026-03-12T11:16:02","guid":{"rendered":"https:\/\/www.cyber40.it\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/"},"modified":"2026-03-12T11:21:55","modified_gmt":"2026-03-12T11:21:55","slug":"esii-project-ai-to-support-soc-teams-in-incident-investigation","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/","title":{"rendered":"ESII project &#8211; AI to support SOC teams in incident investigation"},"content":{"rendered":"\n<p>The increasing complexity of digital environments makes the management of security incidents an increasingly critical activity for SOCs, who are called upon to interpret large volumes of alerts and quickly identify significant anomalies and correlations. Against this backdrop comes <strong>ESII <\/strong><em>(Early Security Incident Investigation)<\/em>, a project <strong><a href=\"https:\/\/www.cyber40.it\/en\/funded-projects\/\">co-funded by Cyber 4.0<\/a> as part of its innovation promotion and technology transfer activities<\/strong>. <\/p>\n\n<p>Developed by <strong><a href=\"https:\/\/www.sharelock.ai\">Sharelock<\/a>,<\/strong> ESII- marketed under the name <strong>SIA-implements<\/strong> a <strong>security incident investigation technology<\/strong> that integrates the use of genAI and Agentic AI into Sharelock&#8217;s Identity Security platform.<\/p>\n\n<p>The goal is to support security teams in alert management by reducing operational complexity and improving the ability to identify, understand, and correlate IT anomalies and incidents throughout the response cycle.<\/p>\n<style>.kb-image15180_3c7ae2-85 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image15180_3c7ae2-85 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-1024x576.png\" alt=\"The ESII project and how its technology works\" class=\"kb-img wp-image-15181\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-1024x576.png 1024w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-300x169.png 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-768x432.png 768w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-1536x864.png 1536w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-2048x1152.png 2048w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-200x113.png 200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<h2 class=\"wp-block-heading has--font-size\"><strong>Technology and innovation<\/strong><\/h2>\n\n<p>From a technological perspective, ESII introduces an evolved model of integration between <strong>artificial intelligence and cybersecurity platforms<\/strong>, enabling:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Automated analysis of security events;<\/li>\n\n\n\n<li>Intelligent investigation of individual anomalies or alert chains;<\/li>\n\n\n\n<li>local data processing to provide greater control and security.<\/li>\n<\/ul>\n<style>.wp-block-kadence-advancedheading.kt-adv-heading15180_ad5ee9-d3, .wp-block-kadence-advancedheading.kt-adv-heading15180_ad5ee9-d3[data-kb-block=\"kb-adv-heading15180_ad5ee9-d3\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading15180_ad5ee9-d3 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading15180_ad5ee9-d3[data-kb-block=\"kb-adv-heading15180_ad5ee9-d3\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<h2 class=\"kt-adv-heading15180_ad5ee9-d3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading15180_ad5ee9-d3\"><strong>Scope of application<\/strong><\/h2>\n\n<ul class=\"wp-block-list\">\n<li>SOC teams automating triage and investigation of alerts<\/li>\n\n\n\n<li>Companies strengthening complex incident management<\/li>\n\n\n\n<li>Organizations enhancing threat detection and incident response solutions with AI support<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\"><strong>Impact and recognition<\/strong><\/h2>\n\n<p>ESII fits into the Sharelock technology ecosystem, recently recognized by <strong>Gartner<\/strong> among the most innovative solutions in the international landscape of<strong>Agentic AI<\/strong> applied to <strong>Threat Detection and Incident Response (TDIR)<\/strong> platforms. In this framework, the project contributes concretely to the evolution of a platform oriented to intelligent automation of incident investigation. <\/p>\n\n<p>By <strong>co-funding Cyber 4.0<\/strong>, ESII has been able to develop and consolidate advanced capabilities for intelligent automation of incident investigation, making a real contribution to the evolution of the cybersecurity industry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The increasing complexity of digital environments makes the management of security incidents an increasingly critical activity for SOCs, who are called upon to interpret large volumes of alerts and quickly identify significant anomalies and correlations. Against this backdrop comes ESII&#8230;<\/p>\n","protected":false},"author":17,"featured_media":15182,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":2,"footnotes":""},"categories":[611],"tags":[632,616,672],"class_list":["post-15186","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","tag-ai-en","tag-cybersecurity-en","tag-innovation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ESII project - AI to support SOC teams in incident investigation - Cyber 4.0<\/title>\n<meta name=\"description\" content=\"ESII implements security incident investigation technology to support security teams in alert management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESII project - AI to support SOC teams in incident investigation - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"ESII implements security incident investigation technology to support security teams in alert management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-12T11:16:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T11:21:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"giovanna buono\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"giovanna buono\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/\"},\"author\":{\"name\":\"giovanna buono\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\"},\"headline\":\"ESII project &#8211; AI to support SOC teams in incident investigation\",\"datePublished\":\"2026-03-12T11:16:02+00:00\",\"dateModified\":\"2026-03-12T11:21:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/\"},\"wordCount\":284,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png\",\"keywords\":[\"AI\",\"Cybersecurity\",\"Innovation\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/\",\"name\":\"ESII project - AI to support SOC teams in incident investigation - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png\",\"datePublished\":\"2026-03-12T11:16:02+00:00\",\"dateModified\":\"2026-03-12T11:21:55+00:00\",\"description\":\"ESII implements security incident investigation technology to support security teams in alert management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png\",\"width\":2560,\"height\":1440,\"caption\":\"Il progetto ESII e come funziona la sua tecnologia\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESII project &#8211; AI to support SOC teams in incident investigation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\",\"name\":\"giovanna buono\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"caption\":\"giovanna buono\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber40\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ESII project - AI to support SOC teams in incident investigation - Cyber 4.0","description":"ESII implements security incident investigation technology to support security teams in alert management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/","og_locale":"en_US","og_type":"article","og_title":"ESII project - AI to support SOC teams in incident investigation - Cyber 4.0","og_description":"ESII implements security incident investigation technology to support security teams in alert management.","og_url":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/","og_site_name":"Cyber 4.0","article_published_time":"2026-03-12T11:16:02+00:00","article_modified_time":"2026-03-12T11:21:55+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png","type":"image\/png"}],"author":"giovanna buono","twitter_card":"summary_large_image","twitter_misc":{"Written by":"giovanna buono","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/"},"author":{"name":"giovanna buono","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f"},"headline":"ESII project &#8211; AI to support SOC teams in incident investigation","datePublished":"2026-03-12T11:16:02+00:00","dateModified":"2026-03-12T11:21:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/"},"wordCount":284,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png","keywords":["AI","Cybersecurity","Innovation"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/","url":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/","name":"ESII project - AI to support SOC teams in incident investigation - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png","datePublished":"2026-03-12T11:16:02+00:00","dateModified":"2026-03-12T11:21:55+00:00","description":"ESII implements security incident investigation technology to support security teams in alert management.","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-scaled.png","width":2560,"height":1440,"caption":"Il progetto ESII e come funziona la sua tecnologia"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/esii-project-ai-to-support-soc-teams-in-incident-investigation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"ESII project &#8211; AI to support SOC teams in incident investigation"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f","name":"giovanna buono","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","caption":"giovanna buono"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"}]}},"taxonomy_info":{"category":[{"value":611,"label":"News"}],"post_tag":[{"value":632,"label":"AI"},{"value":616,"label":"Cybersecurity"},{"value":672,"label":"Innovation"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/03\/Esii_Sharelock-1024x576.png",1024,576,true],"author_info":{"display_name":"giovanna buono","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"},"comment_info":"","category_info":[{"term_id":611,"name":"News","slug":"news-en","term_group":0,"term_taxonomy_id":611,"taxonomy":"category","description":"","parent":0,"count":128,"filter":"raw","term_order":"0","cat_ID":611,"category_count":128,"category_description":"","cat_name":"News","category_nicename":"news-en","category_parent":0}],"tag_info":[{"term_id":632,"name":"AI","slug":"ai-en","term_group":0,"term_taxonomy_id":632,"taxonomy":"post_tag","description":"","parent":0,"count":10,"filter":"raw","term_order":"0"},{"term_id":616,"name":"Cybersecurity","slug":"cybersecurity-en","term_group":0,"term_taxonomy_id":616,"taxonomy":"post_tag","description":"","parent":0,"count":30,"filter":"raw","term_order":"0"},{"term_id":672,"name":"Innovation","slug":"innovation","term_group":0,"term_taxonomy_id":672,"taxonomy":"post_tag","description":"","parent":0,"count":8,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/15186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=15186"}],"version-history":[{"count":1,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/15186\/revisions"}],"predecessor-version":[{"id":15187,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/15186\/revisions\/15187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/15182"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=15186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=15186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=15186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}