{"id":11160,"date":"2022-04-06T09:31:40","date_gmt":"2022-04-06T09:31:40","guid":{"rendered":"https:\/\/blog.cloudthat.com\/?p=11160"},"modified":"2024-06-25T11:02:59","modified_gmt":"2024-06-25T11:02:59","slug":"cloud-computing-security-and-challenges","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/cloud-computing-security-and-challenges","title":{"rendered":"Cloud Computing Security and Challenges"},"content":{"rendered":"","protected":false},"author":291,"featured_media":31452,"parent":0,"comment_status":"open","ping_status":"open","template":"","blog_category":[3606,5897,4369],"user_email":"kavyashree.k@cloudthat.com","published_by":"324","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/11160"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/291"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=11160"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/11160\/revisions"}],"predecessor-version":[{"id":45777,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/11160\/revisions\/45777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/31452"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=11160"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=11160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}