{"id":62377,"date":"2024-12-16T15:29:31","date_gmt":"2024-12-16T15:29:31","guid":{"rendered":"https:\/\/www.cloudthat.com\/resources\/?post_type=blog&#038;p=62377"},"modified":"2024-12-16T15:29:31","modified_gmt":"2024-12-16T15:29:31","slug":"transforming-application-security-with-devsecops-strategies","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/transforming-application-security-with-devsecops-strategies","title":{"rendered":"Transforming Application Security with DevSecOps Strategies"},"content":{"rendered":"","protected":false},"author":905,"featured_media":62452,"parent":0,"comment_status":"open","ping_status":"closed","template":"","blog_category":[3607,3624],"user_email":"deepakraj@cloudthat.com","published_by":"325","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/62377"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/905"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=62377"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/62377\/revisions"}],"predecessor-version":[{"id":62453,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/62377\/revisions\/62453"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/62452"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=62377"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=62377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}