{"id":1251,"date":"2012-06-25T15:59:04","date_gmt":"2012-06-25T19:59:04","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=1251"},"modified":"2026-02-02T19:51:14","modified_gmt":"2026-02-03T00:51:14","slug":"data-risk-fieldshield-mitigation","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/","title":{"rendered":"Data Risk Mitigation via Data Masking"},"content":{"rendered":"<p><strong>Data at Rest is Data at Risk. Mitigate the Risk through Data-Centric Security<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1917 size-thumbnail\" title=\"Data Risk Mitigation\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/08\/creditcards-150x150.jpg\" alt=\"Data Risk Mitigation\" width=\"150\" height=\"150\" \/><em>Data Risk Mitigation &#8230;\u00a0<\/em>the need for it is on the rise in the United States and around the globe. \u00a0Think of this example. \u00a0You are at home opening your mail and you have a shiny new credit card from your credit card company. There is no real information other than &#8220;your information might have been at risk, and to prevent theft, we have issued you a new card&#8221;.<\/p>\n<p>For the last several years, the theft of personally identifiable information (PII) has been on the rise. More than one in four Americans have had their personal information lost or stolen. \u00a0It is not only individuals who are at risk. \u00a0Since 2005, the Privacy Rights Clearinghouse has chronicled <em>reported<\/em> breaches of client, patient, and employee data (including credit card numbers, social security numbers, birth dates, etc.), intellectual property, and other important records exposed through loss, theft, hacking, etc. This is why Data Risk Mitigation is a crucial consideration in a company&#8217;s business planning efforts.<\/p>\n<p>Consider the following cases (one out of MANY per year) where data has been compromised, and how they might relate to you or your company:<\/p>\n<ul>\n<li>In 2014, of the 331 data breaches reported, six exceeded 10 million (m) records. The largest was eBay, which had more than 145m user emails, passwords, DOBs and addresses hacked from a database.<\/li>\n<li>In 2015, personal details of 191m US voters was found on a publicly available database, 15m T-Mobile customer credit check records were exposed, hackers stole more than 10m records from Sony Pictures, and 37 records were stolen from Ashley Madison&#8217;s site.<\/li>\n<li>In 2016, 1.5b login records were reported stolen from Yahoo in 2 prior incidents, 412m at Friend Finder, 360m at MySpace, 43.4m from Weebly, 32m at Twitter, and 22.5m from Foursquare.<\/li>\n<li>In 2017, a Deep Root Analytics cloud database of more than 198m user voters was found unprotected, River City Media inadvertently exposed 1.37b email addresses and other data in a backup archive.<\/li>\n<li>In 2018, 1.1 billion Indian residents&#8217; PII and biometric was exposed when a government portal had a leak. Information on 340m people was vulnerable in an Exactis public server, and 150m MyFitnessPal app user details were hacked. That was also the year of similar embarrassments at Facebook\/Cambridge Analytica, GooglePlus, Cathay Pacific, T-Mobile and Marriott.<\/li>\n<li>In 2019, a hacking forum shared access to a cloud database of, ironically, 773m already-breached emails addresses and 22m unique passwords. A Down Jones watchlist database exposed 2.4m identity records of international politicians and government officials.<\/li>\n<\/ul>\n<p><em>Source: <a href=\"https:\/\/www.privacyrights.org\/data-breach\">https:\/\/www.privacyrights.org\/data-breach<\/a><\/em><\/p>\n<p>These are just a few examples illustrating why it is imperative to protect sensitive data where it resides. Basic security practices should be followed to ensure the protection of data at multiple points of entry, control, and exit. Indeed, companies must guarantee that their information systems are not an open target, and they must protect PII in appropriate ways throughout its life cycle. This means exercising a combination of people, process, and procedural measures that leverage technologies for both endpoint and what IRI calls &#8220;<a href=\"https:\/\/www.iri.com\/blog\/data-protection\/defining-startpoint-data-security\/\">startpoint security<\/a>.&#8221;<\/p>\n<p>It is the data-centric starting point protection (a\/k\/a<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\"> data masking<\/a>) requirements that prompted IRI to develop functionality for finding and de-identifying PII in files and databases. For this reason, IRI offers\u00a0<a href=\"http:\/\/www.iri.com\/products\/fieldshield\" target=\"_blank\" rel=\"noopener\">FieldShield<\/a>\u00a0to find and protect data at risk down to the field level in tables and flat files. IRI subsequently developed <a href=\"https:\/\/www.iri.com\/products\/cellshield\">CellShield<\/a> to find, classify, and mask PII in multiple Excel spreadsheets at once, and <a href=\"https:\/\/www.iri.com\/products\/darkshield\">DarkShield<\/a> to do the same in unstructured text, document, and image files.<\/p>\n<p>FieldShield, CellShield and DarkShield offer users a choice &#8211; for each item of PII (or data class) &#8211; of AES, GPG, or other encryption libraries, data redaction (e.g. rendering a credit card number unreadable except the last 4 digits) and de-identification (e.g. separating or pseudonymizing sensitive information in medical records), hashing and so on &#8230; up to 14 different functional categories of protection in the case of FieldShield.<\/p>\n<p>These functions can be applied to fields in multiple data sources through automatic wizard-driven workflows, and can also be seamlessly invoked within data warehousing, data\/DB migration, MDM, and reporting\/analytic data preparation operations in the <a href=\"http:\/\/www.iri.com\/products\/voracity\">IRI Voracity<\/a> data management platform. \u00a0Granular data searching and classification wizards, field-level security functions, re-ID risk determination reporting, and automatic XML job (audit) logs, help organizations mitigate data risk, comply with internal and government privacy regulation, and provide safe and realistic test data for DevOps and more.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data at Rest is Data at Risk. Mitigate the Risk through Data-Centric Security Data Risk Mitigation &#8230;\u00a0the need for it is on the rise in the United States and around the globe. \u00a0Think of this example. \u00a0You are at home opening your mail and you have a shiny new credit card from your credit card<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/\" title=\"Data Risk Mitigation via Data Masking\">Read More<\/a><\/div>\n","protected":false},"author":6,"featured_media":11740,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,3,2255],"tags":[14,13,42,12,9,41,43,22],"class_list":["post-1251","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-vldb-operations","category-archived-articles","tag-data-masking","tag-data-protection-2","tag-data-risk-mitigation","tag-de-identification","tag-fieldshield","tag-information-protection","tag-protecting-consumer-data","tag-pseudonymization"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Risk Mitigation via Data Masking - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Risk Mitigation via Data Masking\" \/>\n<meta property=\"og:description\" content=\"Data at Rest is Data at Risk. Mitigate the Risk through Data-Centric Security Data Risk Mitigation &#8230;\u00a0the need for it is on the rise in the United States and around the globe. \u00a0Think of this example. \u00a0You are at home opening your mail and you have a shiny new credit card from your credit cardRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-25T19:59:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-03T00:51:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"534\" \/>\n\t<meta property=\"og:image:height\" content=\"463\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Simpson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Simpson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/\"},\"author\":{\"name\":\"Jeff Simpson\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9c7e21f2a369c971287d5030b7c408e6\"},\"headline\":\"Data Risk Mitigation via Data Masking\",\"datePublished\":\"2012-06-25T19:59:04+00:00\",\"dateModified\":\"2026-02-03T00:51:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/\"},\"wordCount\":747,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg\",\"keywords\":[\"data masking\",\"data protection\",\"Data Risk Mitigation\",\"de-identification\",\"FieldShield\",\"information protection\",\"protecting consumer data\",\"pseudonymization\"],\"articleSection\":[\"Data Masking\/Protection\",\"VLDB\",\"Archived Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/\",\"url\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/\",\"name\":\"Data Risk Mitigation via Data Masking - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg\",\"datePublished\":\"2012-06-25T19:59:04+00:00\",\"dateModified\":\"2026-02-03T00:51:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg\",\"width\":534,\"height\":463},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Risk Mitigation via Data Masking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9c7e21f2a369c971287d5030b7c408e6\",\"name\":\"Jeff Simpson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c636dae166fc9fecf2b62e88fe135187?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c636dae166fc9fecf2b62e88fe135187?s=96&d=blank&r=g\",\"caption\":\"Jeff Simpson\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/jeffs\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Risk Mitigation via Data Masking - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/","og_locale":"en_US","og_type":"article","og_title":"Data Risk Mitigation via Data Masking","og_description":"Data at Rest is Data at Risk. Mitigate the Risk through Data-Centric Security Data Risk Mitigation &#8230;\u00a0the need for it is on the rise in the United States and around the globe. \u00a0Think of this example. \u00a0You are at home opening your mail and you have a shiny new credit card from your credit cardRead More","og_url":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/","og_site_name":"IRI","article_published_time":"2012-06-25T19:59:04+00:00","article_modified_time":"2026-02-03T00:51:14+00:00","og_image":[{"width":534,"height":463,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg","type":"image\/jpeg"}],"author":"Jeff Simpson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeff Simpson","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/"},"author":{"name":"Jeff Simpson","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9c7e21f2a369c971287d5030b7c408e6"},"headline":"Data Risk Mitigation via Data Masking","datePublished":"2012-06-25T19:59:04+00:00","dateModified":"2026-02-03T00:51:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/"},"wordCount":747,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg","keywords":["data masking","data protection","Data Risk Mitigation","de-identification","FieldShield","information protection","protecting consumer data","pseudonymization"],"articleSection":["Data Masking\/Protection","VLDB","Archived Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/","url":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/","name":"Data Risk Mitigation via Data Masking - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg","datePublished":"2012-06-25T19:59:04+00:00","dateModified":"2026-02-03T00:51:14+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg","width":534,"height":463},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-risk-fieldshield-mitigation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Risk Mitigation via Data Masking"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9c7e21f2a369c971287d5030b7c408e6","name":"Jeff Simpson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c636dae166fc9fecf2b62e88fe135187?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c636dae166fc9fecf2b62e88fe135187?s=96&d=blank&r=g","caption":"Jeff Simpson"},"url":"https:\/\/www.iri.com\/blog\/author\/jeffs\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/credit-cards.jpg","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/1251"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=1251"}],"version-history":[{"count":54,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/1251\/revisions"}],"predecessor-version":[{"id":13641,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/1251\/revisions\/13641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/11740"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=1251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=1251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=1251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}