{"id":4969,"date":"2026-02-10T05:59:00","date_gmt":"2026-02-10T13:59:00","guid":{"rendered":"https:\/\/stage.paloaltonetworks.com\/perspectives\/?p=4969"},"modified":"2026-02-10T14:03:09","modified_gmt":"2026-02-10T22:03:09","slug":"why-traditional-security-fails-in-the-age-of-non-deterministic-ai","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/","title":{"rendered":"Why Traditional Security Fails in the Age of Non-Deterministic AI"},"content":{"rendered":"\n<p>Every enterprise today is in a race. We are racing to put AI to work \u2014 from copilots to autonomous agents \u2014 because the potential for productivity and innovation is extraordinary. But as we accelerate, we are discovering that the road itself has changed.<\/p>\n\n\n\n<p>For decades, cybersecurity was built on a &#8220;deterministic&#8221; model. We knew how applications behaved: Input A led to Output B. If an application did something unexpected, it was a bug or a breach. The threat surface, while vast, was relatively static.<\/p>\n\n\n\n<p>The page has officially turned on that era.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Rise of the Non-Deterministic Threat<\/strong><\/h2>\n\n\n\n<p>AI introduces a fundamental shift in how applications behave, reason, and use data. AI models are non-deterministic; they are adaptive, creative, and constantly evolving. This means the threat surface is no longer static. It expands and changes in ways that traditional, rule-based security tools simply cannot match.<\/p>\n\n\n\n<p>Without a unified strategy, every new AI interaction, whether through an app, model, or agent, multiplies your blind spots. It makes it increasingly difficult for leaders to answer the most basic, yet critical question: <em>Is this safe to deploy?<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The &#8220;Point Tool&#8221; Trap<\/strong><\/h2>\n\n\n\n<p>In the rush to secure these new systems, many organizations are falling into a familiar trap: adding more point tools. They see a new risk \u2014 prompt injection, model theft, data leakage \u2014 and they buy a specific tool to fix it.<\/p>\n\n\n\n<p><br>But AI is ubiquitous. And so, securing AI is not about patching holes. Reacting to every new risk with a dedicated solution creates a fragmented security posture. It leaves you stitching together disconnected alerts while adversaries move across the gaps. In the Age of AI, complexity is the enemy of speed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A Unified Approach for a Unified Ecosystem<\/strong><\/h2>\n\n\n\n<p>To move fast, we must stop treating AI security as an add-on and start treating it as an architectural requirement. It requires unifying how the entire AI ecosystem is protected \u2014 from the models developers build to the agents and chatbot interfaces employees use every day.<\/p>\n\n\n\n<p>Organizations must pivot to a platform approach that allows them to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Discover<\/strong> what AI is actually running in the environment (shadow AI is often 10x what IT suspects).<\/li>\n\n\n\n<li><strong>Assess<\/strong> the risks holistically on your AI ecosystem including sensitive data exposure.&nbsp;<\/li>\n\n\n\n<li><strong>Protect<\/strong> your AI deployment in real-time, end-to-end.<\/li>\n<\/ul>\n\n\n\n<p>This is the vision behind <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/prisma-ai-runtime-security\"><strong>Prisma AIRS<\/strong><\/a>. We built it to give enterprises a single, comprehensive platform to secure AI at scale. Instead of managing disjointed tools, Prisma AIRS brings AI activity into a unified security and governance framework.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Deploying Bravely<\/strong><\/h2>\n\n\n\n<p>As I discuss in my <a href=\"https:\/\/www.paloaltonetworks.com\/deploybravely#executives\">video<\/a>, the goal isn&#8217;t just to &#8220;lock down&#8221; AI since that may well be impossible to do. It is to turn security into an accelerator.<\/p>\n\n\n\n<p>When you have a unified defense, you don&#8217;t have to choose between security and speed. You can move boldly, knowing your AI is protected from development to deployment. Speed with safety fuels secure innovation.<\/p>\n\n\n\n<p><em>This post is Part 1 of our <\/em><strong><em><a href=\"https:\/\/www.paloaltonetworks.com\/deploybravely#executives\">Deploy Bravely<\/a><\/em><\/strong><em> series, exploring how to secure the AI enterprise through a platform approach.<\/em><\/p>\n\n\n\n<p><strong><em>Up Next:<\/em><\/strong><em> Ian Swanson on the <\/em><strong><em><a href=\"https:\/\/paloaltonetworks.com\/perspectives\/the-pilot-trap-why-scaling-ai-is-impossible-with-legacy-appsec-tools\/\">&#8220;Pilot Trap&#8221;<\/a><\/em><\/strong><em> and why legacy tools are keeping your AI stuck in the lab.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Deploy Bravely. How your AI should be protected from development to deployment.<\/p>\n","protected":false},"author":7,"featured_media":5164,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,187],"tags":[],"coauthors":[13],"class_list":["post-4969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-secure-ai-usage"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Traditional Security Fails in the Age of Non-Deterministic AI - Perspectives<\/title>\n<meta name=\"description\" content=\"Deploy Bravely. How your AI should be protected from development to deployment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Traditional Security Fails in the Age of Non-Deterministic AI - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Deploy Bravely. How your AI should be protected from development to deployment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-10T13:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-10T22:03:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anand Oswal\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/\"},\"author\":{\"name\":\"Ben Hasskamp\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917\"},\"headline\":\"Why Traditional Security Fails in the Age of Non-Deterministic AI\",\"datePublished\":\"2026-02-10T13:59:00+00:00\",\"dateModified\":\"2026-02-10T22:03:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/\"},\"wordCount\":536,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg\",\"articleSection\":[\"AI\",\"Secure AI Usage\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/\",\"name\":\"Why Traditional Security Fails in the Age of Non-Deterministic AI - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg\",\"datePublished\":\"2026-02-10T13:59:00+00:00\",\"dateModified\":\"2026-02-10T22:03:09+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917\"},\"description\":\"Deploy Bravely. How your AI should be protected from development to deployment.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Traditional Security Fails in the Age of Non-Deterministic AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917\",\"name\":\"Ben Hasskamp\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"Ben Hasskamp\"},\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/bhasskamp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Traditional Security Fails in the Age of Non-Deterministic AI - Perspectives","description":"Deploy Bravely. How your AI should be protected from development to deployment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/","og_locale":"en_US","og_type":"article","og_title":"Why Traditional Security Fails in the Age of Non-Deterministic AI - Perspectives","og_description":"Deploy Bravely. How your AI should be protected from development to deployment.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/","og_site_name":"Perspectives","article_published_time":"2026-02-10T13:59:00+00:00","article_modified_time":"2026-02-10T22:03:09+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg","type":"image\/jpeg"}],"author":"Anand Oswal","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/"},"author":{"name":"Ben Hasskamp","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917"},"headline":"Why Traditional Security Fails in the Age of Non-Deterministic AI","datePublished":"2026-02-10T13:59:00+00:00","dateModified":"2026-02-10T22:03:09+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/"},"wordCount":536,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg","articleSection":["AI","Secure AI Usage"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/","name":"Why Traditional Security Fails in the Age of Non-Deterministic AI - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg","datePublished":"2026-02-10T13:59:00+00:00","dateModified":"2026-02-10T22:03:09+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917"},"description":"Deploy Bravely. How your AI should be protected from development to deployment.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/DeployBravely-MainOrig-responsive-1200x628-1.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/why-traditional-security-fails-in-the-age-of-non-deterministic-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Why Traditional Security Fails in the Age of Non-Deterministic AI"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917","name":"Ben Hasskamp","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"Ben Hasskamp"},"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/bhasskamp\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=4969"}],"version-history":[{"count":10,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4969\/revisions"}],"predecessor-version":[{"id":5149,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4969\/revisions\/5149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/5164"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=4969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=4969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=4969"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=4969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}