{"id":5283,"date":"2026-03-04T06:00:00","date_gmt":"2026-03-04T14:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/perspectives\/?p=5283"},"modified":"2026-03-03T12:42:43","modified_gmt":"2026-03-03T20:42:43","slug":"the-821-problem-securing-the-invisible-majority","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/","title":{"rendered":"The 82:1 Problem: Securing the Invisible Majority"},"content":{"rendered":"\n<p>The new workforce is here. For every human employee, there are now estimated to be <a href=\"https:\/\/www.cyberark.com\/press\/machine-identities-outnumber-humans-by-more-than-80-to-1-new-report-exposes-the-exponential-threats-of-fragmented-identity-security\/\">82 machine identities<\/a> operating within one enterprise. These identities correspond to service accounts, API keys, bots and autonomous AI agents that run the modern digital infrastructure. They work 24\/7, never taking a vacation, getting sick, or logging out. Yet, they always have access to your most sensitive data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Outdated Strategy Competing with a Crisis<\/h2>\n\n\n\n<p>As it stands today, we are fighting a 2026 challenge with a 2010 strategy. Perhaps it\u2019s because we\u2019ve spent decades perfecting the identity and access management (IAM) industry to secure human users. Yet, we are watching that model break down in real time. Today, access privilege is based on responsibility, not on a neat job title. Powerful access now lives in the hands of executives as well as developers, operators and automated scripts.<\/p>\n\n\n\n<p>The danger is in the double standard. Humans are governed by the rigorous lifecycle controls of HR \u2014 vetting, onboarding and offboarding, but machines do not. We have failed to apply the basic IAM discipline to the machine workforce, despite the fact that they now outnumber us 82 to 1, run without interruption, and operate with pervasive, unmonitored access privilege. We have created both a security gap and an engineering crisis where our most powerful actors are the ones we understand the least.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Solving the Math<\/h2>\n\n\n\n<p>You have to look at the math to understand the scale of the problem. If you have 10,000 employees, for example, you likely have over <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/2026-cyber-predictions\">820,000 machine identities<\/a>. In this equation, your people are a rounding error.<\/p>\n\n\n\n<p>Yet, look where the budget goes. We spend millions of dollars on phishing training, biometric scanners and single sign-on (SSO) for employees. We subject them to background checks, interviews, performance reviews and strict offboarding protocols.<\/p>\n\n\n\n<p>Consider the machine. A developer can spin up a new service account in seconds. Often, to save time, they grant it \u201cadmin\u201d privileges \u2014 the digital equivalent of giving the summer intern the master key to the building. Once that project is done, the developer moves on, but the identity remains. It sits there, dormant but active, a sort of zombie account waiting for an attacker to find it.<\/p>\n\n\n\n<p>We have created an environment where the most powerful actors in our networks are also the least supervised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Missing Discipline: Identity Security for Machines<\/h2>\n\n\n\n<p>The solution is to fundamentally change our operational philosophy. We need to apply the rigorous discipline of identity security to our machine workforce. We need the same level of visibility and control that our HR discipline enables for humans. And we need to treat both machines and AI agents as high-risk users.<\/p>\n\n\n\n<p>If we managed our digital workforce the way we manage our human one, we would see three immediate shifts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Discovery and Onboarding During the Hiring Process\u00a0<\/h3>\n\n\n\n<p>Humans cannot simply walk into an office and start working. They need an offer letter, a role, access privileges, a manager and credentials. In the machine world, however, \u201csilent births\u201d are the norm. Identities appear out of nowhere, created by scripts or automated processes without any oversight. The engineering fix is to move toward Identity-as-Code. In this model, no machine identity should exist without a defined purpose, owner and planned lifecycle. Put simply, if it doesn\u2019t have a sponsor, it doesn\u2019t get access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Performance Review Controls<\/h3>\n\n\n\n<p>We review human performance yearly, quarterly or sometimes monthly to check whether employees are excelling at their jobs, achieving the desired outcomes, or underperforming. We rarely apply this same scrutiny to service accounts, despite the fact that they operate continuously.&nbsp;<\/p>\n\n\n\n<p>This endurance becomes a fundamental data problem that requires continuous behavioral monitoring. We need to know instantly if an API key, which usually only talks to the billing server, is suddenly trying to access the customer database at 3:00 a.m. That level of performance issue necessitates immediate intervention.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Termination-Lifecycle Management<\/h3>\n\n\n\n<p>When a human leaves the workplace, we use a checklist that includes taking the laptop, cutting access and saying goodbye. But, when a cloud instance is spun down or a microservice is deprecated, the identity often lives on in perpetuity. To solve this, we need to build a kill switch directly into the <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-the-ci-cd-pipeline-and-ci-cd-security\">CI\/CD pipeline<\/a>. Automated deprovisioning ensures that, when the code dies, the identity dies with it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">From Policy to Engineering<\/h2>\n\n\n\n<p>For years, we have tried to solve identity through policy. We have written PDFs detailing \u201cBest Practices for Access Management\u201d and hoped developers would read them.<\/p>\n\n\n\n<p>The page has turned and the chapter has closed. You cannot govern over 800,000 entities with a PDF. You must govern them with code.<\/p>\n\n\n\n<p>Conversations must move from the CISO to the VP of engineering, because identity is now an infrastructure problem. It is about how we architect our cloud environments, manage secrets and deploy code.<\/p>\n\n\n\n<p>The \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/ais-front-door-why-the-browser-is-your-most-critical-control-point\/\">Unsecured Front Door<\/a>\u201d is now the thousands of browsers and API endpoints connecting your enterprise to the world. If your strategy relies on manual reviews and spreadsheets, you have already lost. The attackers are using automation, scanning for these overprivileged, unmonitored accounts at machine speed. We cannot fight them with a decade\u2019s old mindset.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Creating a Safe and Successful Organizational Chart<\/h2>\n\n\n\n<p>Ultimately, all of this demands a moment of radical honesty in the C-suite. We need to admit that the organizational chart is nostalgic fiction. It captures the people, but it misses the power.<\/p>\n\n\n\n<p>The 82:1 ratio is a structural reality that isn\u2019t going away. We can continue to pretend that the 1% are the only ones who matter, or we can accept the reality of our new workforce.<\/p>\n\n\n\n<p>Governance has evolved beyond security compliance to now be about operational control. If you don\u2019t have an automated, code-based system to hire, manage and fire your machine workers, you aren\u2019t running a tight ship; you are running a ghost ship.<\/p>\n\n\n\n<p>Curious what else Amy has to say? Check out her other articles on <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/author\/amy-blackshaw\/\">Perspectives<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why the 82:1 machine to human ratio is a reality that isn\u2019t going away.<\/p>\n","protected":false},"author":1,"featured_media":5284,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,210],"tags":[],"coauthors":[196],"class_list":["post-5283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-identity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The 82:1 Problem: Securing the Invisible Majority - Perspectives<\/title>\n<meta name=\"description\" content=\"Why the 82:1 machine to human ratio is a reality that isn\u2019t going away.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 82:1 Problem: Securing the Invisible Majority - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Why the 82:1 machine to human ratio is a reality that isn\u2019t going away.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-04T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amy Blackshaw\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"headline\":\"The 82:1 Problem: Securing the Invisible Majority\",\"datePublished\":\"2026-03-04T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/\"},\"wordCount\":989,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg\",\"articleSection\":[\"AI\",\"Identity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/\",\"name\":\"The 82:1 Problem: Securing the Invisible Majority - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg\",\"datePublished\":\"2026-03-04T14:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"description\":\"Why the 82:1 machine to human ratio is a reality that isn\u2019t going away.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg\",\"width\":1920,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 82:1 Problem: Securing the Invisible Majority\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\"],\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 82:1 Problem: Securing the Invisible Majority - Perspectives","description":"Why the 82:1 machine to human ratio is a reality that isn\u2019t going away.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/","og_locale":"en_US","og_type":"article","og_title":"The 82:1 Problem: Securing the Invisible Majority - Perspectives","og_description":"Why the 82:1 machine to human ratio is a reality that isn\u2019t going away.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/","og_site_name":"Perspectives","article_published_time":"2026-03-04T14:00:00+00:00","og_image":[{"width":1920,"height":840,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg","type":"image\/jpeg"}],"author":"Amy Blackshaw","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/"},"author":{"name":"admin","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"headline":"The 82:1 Problem: Securing the Invisible Majority","datePublished":"2026-03-04T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/"},"wordCount":989,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg","articleSection":["AI","Identity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/","name":"The 82:1 Problem: Securing the Invisible Majority - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg","datePublished":"2026-03-04T14:00:00+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"description":"Why the 82:1 machine to human ratio is a reality that isn\u2019t going away.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/82-1-problem-featured.jpg","width":1920,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-821-problem-securing-the-invisible-majority\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"The 82:1 Problem: Securing the Invisible Majority"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"admin"},"sameAs":["http:\/\/localhost\/wordpress"],"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/5283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=5283"}],"version-history":[{"count":2,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/5283\/revisions"}],"predecessor-version":[{"id":5301,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/5283\/revisions\/5301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/5284"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=5283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=5283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=5283"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=5283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}