{"id":254401,"date":"2025-10-01T10:55:13","date_gmt":"2025-10-01T08:55:13","guid":{"rendered":"https:\/\/4itsolutions.com\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/"},"modified":"2025-10-01T10:55:13","modified_gmt":"2025-10-01T08:55:13","slug":"mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory","status":"publish","type":"post","link":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/","title":{"rendered":"MxDR on the front line: when security shuts down (or powers up) a factory."},"content":{"rendered":"<p>In that moment we\u2019re no longer talking about IT, but about margins, cash, unfulfilled orders, and staff sent home. It\u2019s when we realize that cybersecurity doesn\u2019t protect servers\u2014it protects production. Two recent cases, very different in sector and geography, deliver the same uncomfortable truth.  <\/p>\n<h4><strong>Jaguar Land Rover: the litmus test for outsourcing.<\/strong><\/h4>\n<p>At the end of August 2025 in the UK, Jaguar Land Rover chose to shut down its network to contain an intrusion. The decision was drastic but necessary: production stopped and stayed down for weeks while recovery efforts raced against the clock. In the midst of it came an unprecedented political signal: a public guarantee on a multi-billion-pound loan to prevent a domino effect from toppling the supply chain. This is where the incident shifts from technical to economic. When an OEM grinds to a halt, it\u2019s not just the assembly of body shells that stops: the suppliers\u2019 cash cycle jams, deliveries and payments slip, and trust and resilience erode.    <\/p>\n<p>The story becomes even more complicated when the company confirms the theft of some data. Yet the conversation remains anchored to the operational dimension: the real problem isn\u2019t the abstract \u201cbreach,\u201d but the silence of the production lines. Within this story lies a knot we can\u2019t avoid: a significant portion of IT, including security, had been entrusted to an offshore provider based in Mumbai. That\u2019s not unusual\u2014outsourcing is standard practice for many multinationals and it works when governed rigorously. The point, however, is that supply chains distributed across multiple jurisdictions introduce concrete complexities: different notification rules, time zones that stretch escalation windows, data residency and audits that demand extra coordination. This is where the IT partner makes the difference: operational proximity, the same regulatory framework, aligned language and corporate culture, on-site response, and a control perimeter that binds governance and speed together. Outsourcing isn\u2019t the problem;<strong> the distance between responsibility and control is<\/strong>.      <\/p>\n<h4><strong>Asahi: when logistics becomes security<\/strong><\/h4>\n<p>A few weeks later, on the other side of the world, Asahi announces an attack that throws its systems into disarray. In Japan, orders and shipments are suspended, call centers go quiet, and production grinds to a halt, eventually involving dozens of plants. At that point the company states it has no evidence of personal data exfiltration. That\u2019s good news, but it changes little for anyone who needs to stock shelves: if the truck doesn\u2019t leave the warehouse, the loss is today, not tomorrow. In beverages\u2014where rotation is king\u2014each day of downtime turns into stockouts, contractual penalties, and aggressive discounting to win back volume. Here the \u201ccyber\u201d dimension merges with the \u201clogistics\u201d one until they\u2019re indistinguishable: the first enables the second, and the second measures the first.     <\/p>\n<h4><strong>What\u2019s the fil rouge? Throughput as a security metric <\/strong><\/h4>\n<p>JLR and Asahi yield different outcomes on the data front but converge at the same pain point: prolonged production stoppage. That\u2019s why reading security solely through the lens of a \u201cdata breach\u201d is misleading. The metric that matters, in the short term, is throughput: how many hours of downtime did we avoid? How much margin did we protect by preventing an IT incident from becoming an industrial crisis? The answer doesn\u2019t lie in a new piece of software, but in a capability: seeing early and acting immediately, correlating heterogeneous signals across identity, endpoints, network, cloud and\u2014where present\u2014factory technology.    <\/p>\n<h4><strong>From fear to control: why MxDR shifts the balance<\/strong><\/h4>\n<p>You need an operating model that combines extended detection with instant response. That\u2019s why our MxDR service exists: real analysts on duty 24\/7, multi-source telemetry that correlates events across IT and OT, containment playbooks that isolate, block, and restore before damage breaks through the digital perimeter and reaches the factory gates, and reporting that speaks the CFO\u2019s language by quantifying avoided downtime and costs not incurred.<br \/>In the end, the difference is surprisingly simple: turning a potential industrial blackout into a contained service disruption. Don\u2019t wait for the next stoppage. Our Security Essentials turn your organization\u2019s weak signals into immediate action. The rest is discipline, governance, and a promise worth more than a thousand slides: the lines stay on.     <\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s a moment, in every cyber incident, when IT stops being about logs and firewalls and becomes an industrial matter: the conveyor stops, the forklifts fall silent, and the trucks wait at the gates.<\/p>\n","protected":false},"author":4,"featured_media":254385,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[35],"tags":[],"class_list":["post-254401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MxDR on the front line: when security shuts down (or powers up) a factory. - 4IT Solutions<\/title>\n<meta name=\"description\" content=\"There\u2019s a moment in every cyber incident when IT stops being about logs and firewalls and becomes an industrial matter: the conveyor belt stops, the forklifts fall silent, and the trucks wait at the gates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MxDR on the front line: when security shuts down (or powers up) a factory. - 4IT Solutions\" \/>\n<meta property=\"og:description\" content=\"There\u2019s a moment in every cyber incident when IT stops being about logs and firewalls and becomes an industrial matter: the conveyor belt stops, the forklifts fall silent, and the trucks wait at the gates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/\" \/>\n<meta property=\"og:site_name\" content=\"4IT Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/4itsolutions10\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-01T08:55:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/10\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefano Papaleo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefano Papaleo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/\"},\"author\":{\"name\":\"Stefano Papaleo\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/00e74235300c4565c3d41e8f097a5d74\"},\"headline\":\"MxDR on the front line: when security shuts down (or powers up) a factory.\",\"datePublished\":\"2025-10-01T08:55:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/\"},\"wordCount\":718,\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/\",\"name\":\"MxDR on the front line: when security shuts down (or powers up) a factory. - 4IT Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg\",\"datePublished\":\"2025-10-01T08:55:13+00:00\",\"description\":\"There\u2019s a moment in every cyber incident when IT stops being about logs and firewalls and becomes an industrial matter: the conveyor belt stops, the forklifts fall silent, and the trucks wait at the gates.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/#primaryimage\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/category\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"MxDR on the front line: when security shuts down (or powers up) a factory.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"name\":\"4IT Solutions\",\"description\":\"Soluzioni informatiche per la tua azienda\",\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/4itsolutions.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\",\"name\":\"4IT Solutions\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"4IT Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/4itsolutions10\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/4it-solutions\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/00e74235300c4565c3d41e8f097a5d74\",\"name\":\"Stefano Papaleo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"caption\":\"Stefano Papaleo\"},\"description\":\"CTO - Chief Technology Officer\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/author\\\/stefano_papaleo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MxDR on the front line: when security shuts down (or powers up) a factory. - 4IT Solutions","description":"There\u2019s a moment in every cyber incident when IT stops being about logs and firewalls and becomes an industrial matter: the conveyor belt stops, the forklifts fall silent, and the trucks wait at the gates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/","og_locale":"en_US","og_type":"article","og_title":"MxDR on the front line: when security shuts down (or powers up) a factory. - 4IT Solutions","og_description":"There\u2019s a moment in every cyber incident when IT stops being about logs and firewalls and becomes an industrial matter: the conveyor belt stops, the forklifts fall silent, and the trucks wait at the gates.","og_url":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/","og_site_name":"4IT Solutions","article_publisher":"https:\/\/www.facebook.com\/4itsolutions10","article_published_time":"2025-10-01T08:55:13+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/10\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg","type":"image\/jpeg"}],"author":"Stefano Papaleo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Stefano Papaleo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/#article","isPartOf":{"@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/"},"author":{"name":"Stefano Papaleo","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/00e74235300c4565c3d41e8f097a5d74"},"headline":"MxDR on the front line: when security shuts down (or powers up) a factory.","datePublished":"2025-10-01T08:55:13+00:00","mainEntityOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/"},"wordCount":718,"publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/10\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/","url":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/","name":"MxDR on the front line: when security shuts down (or powers up) a factory. - 4IT Solutions","isPartOf":{"@id":"https:\/\/4itsolutions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/#primaryimage"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/10\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg","datePublished":"2025-10-01T08:55:13+00:00","description":"There\u2019s a moment in every cyber incident when IT stops being about logs and firewalls and becomes an industrial matter: the conveyor belt stops, the forklifts fall silent, and the trucks wait at the gates.","breadcrumb":{"@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/#primaryimage","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/10\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/10\/hasan-tayyar-besik-u8NHt7AH2d8-unsplash.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/4itsolutions.com\/en\/mxdr-on-the-front-line-when-security-shuts-down-or-powers-up-a-factory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/4itsolutions.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/4itsolutions.com\/en\/category\/blog-en\/"},{"@type":"ListItem","position":3,"name":"MxDR on the front line: when security shuts down (or powers up) a factory."}]},{"@type":"WebSite","@id":"https:\/\/4itsolutions.com\/#website","url":"https:\/\/4itsolutions.com\/","name":"4IT Solutions","description":"Soluzioni informatiche per la tua azienda","publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/4itsolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/4itsolutions.com\/#organization","name":"4IT Solutions","url":"https:\/\/4itsolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","width":512,"height":512,"caption":"4IT Solutions"},"image":{"@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/4itsolutions10","https:\/\/www.linkedin.com\/company\/4it-solutions\/"]},{"@type":"Person","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/00e74235300c4565c3d41e8f097a5d74","name":"Stefano Papaleo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","caption":"Stefano Papaleo"},"description":"CTO - Chief Technology Officer","url":"https:\/\/4itsolutions.com\/en\/author\/stefano_papaleo\/"}]}},"_links":{"self":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/254401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/comments?post=254401"}],"version-history":[{"count":0,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/254401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media\/254385"}],"wp:attachment":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media?parent=254401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/categories?post=254401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/tags?post=254401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}