{"id":2639,"date":"2021-08-31T12:31:42","date_gmt":"2021-08-31T12:31:42","guid":{"rendered":"https:\/\/www.cloudnowtech.com\/blog\/?p=2639"},"modified":"2021-12-02T12:14:59","modified_gmt":"2021-12-02T06:44:59","slug":"is-your-mobile-app-secure","status":"publish","type":"post","link":"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/","title":{"rendered":"Is your mobile app secure?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Current location, banking information, personal information&#8230; there are no limits to what a breach in mobile security can give hackers access to.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a <\/span><a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/ves-msi-infographic.pdf\"><span style=\"font-weight: 400;\">Verizon Mobile Security Index report<\/span><\/a><span style=\"font-weight: 400;\">, it was found that mobile threats were escalating: Around 83% of the organizations surveyed reported they were at risk from mobile threats; 86% said mobile threats are growing more quickly than other threats; almost 50% said they sacrificed mobile security for business objectives and as a result, were 2x more likely to be compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mobile apps are vulnerable to attack from various points. Here are some of the major sources of threats, and possible solutions for you to consider.<\/span><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2644 alignleft\" src=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-1.png?resize=81%2C81&#038;ssl=1\" alt=\"\" width=\"81\" height=\"81\" srcset=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-1.png?w=81&amp;ssl=1 81w, https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-1.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 81px) 100vw, 81px\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">The cloud environment<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">When it comes to transmission of data, there are security risks between the pathways and endpoints, which hackers can exploit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Areas of concern for mobile application security include authorization, authentication and session handling. Secure authentication can be an issue for mobile apps as longer passwords are more difficult to deal with on smaller devices. Additionally, if some applications reuse tokens for re-authentication purposes, it leaves the app open to hackers to access the tokens and imitate a valid user.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Small changes anywhere in the system, including in the dependencies, can have a major impact, especially on security. Often, something as simple as forgetting to fix an access issue could result in later exploitation. In mobile apps, several modular elements are linked via APIs and microservice calls, which means that a single security flaw could have a domino-like effect throughout the app.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The solution would be to use an automated tool with a comprehensive database to keep an eye on vulnerabilities in open source components.<\/span><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2643 alignleft\" src=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-2.png?resize=81%2C81&#038;ssl=1\" alt=\"\" width=\"81\" height=\"81\" srcset=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-2.png?w=81&amp;ssl=1 81w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-2.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 81px) 100vw, 81px\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">Speed of deployment<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">Cloud environments are constantly changing. The rapid software release cycles mean that any component of the microservices application can be updated every day. Infrastructure as Code (IaC) and immutability means that apps are constantly torn down and recreated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The solution would be to make security an integral part of the app lifecycle. One way would be to update your process from DevOps to <\/span><a href=\"https:\/\/www.ibm.com\/in-en\/cloud\/learn\/devsecops\"><span style=\"font-weight: 400;\">DevSecOps<\/span><\/a><span style=\"font-weight: 400;\">. Also, consider planning security check through the <a href=\"https:\/\/www.cloudnowtech.com\/application-development-services.html\">application development<\/a> lifecycle, and not just during launch.<\/span><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2642 alignleft\" src=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-3.png?resize=81%2C81&#038;ssl=1\" alt=\"\" width=\"81\" height=\"81\" srcset=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-3.png?w=81&amp;ssl=1 81w, https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-3.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 81px) 100vw, 81px\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">Serverless structure<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">Cloud-native apps are based on containerization, microservices architecture, dynamic orchestration, and serverless platforms, and therefore their entire lifecycle is often solely in the cloud environment. While on the one hand, this ensures scalability, resilience, and quick development and deployment, on the other, it raises security concerns.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When the system is split into multiple callable components with event-driven triggers from different sources, it becomes a target for malicious activity. <\/span><a href=\"https:\/\/www.cloudnowtech.com\/blog\/kubernetes-vs-serverless-how-do-you-choose\/\"><span style=\"font-weight: 400;\">Serverless <\/span><\/a><span style=\"font-weight: 400;\">computing brings with it its own set of security challenges, like \u201cinjection flaws\u201d for instance, where untrusted input is passed directly to an interpreter and gets executed or evaluated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The solution lies in applying robust authentication schemes, which provide proper access control and protection to every relevant function, event type, and trigger. Security best practices for orchestrators like Kubernetes include isolating nodes, limiting and monitoring traffic between containers, and using third-party authentication for the API server.<\/span><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2641 alignleft\" src=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-4.png?resize=81%2C81&#038;ssl=1\" alt=\"\" width=\"81\" height=\"81\" srcset=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-4.png?w=81&amp;ssl=1 81w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39-Icon-4.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 81px) 100vw, 81px\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">Multiple interactions<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">When there are too many people and systems accessing cloud-native resources, it can lead to security breaches. Providing any entity with greater access than it requires can give rise to more points of security failure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this case, the solution lies in assigning unique access and permissions to each container and individual; defining granular permissions for containers in a cluster; and creating a minimal set of permissions for each function or container.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">When it comes to mobile application security, quality comes first. And that means quality engineering &#8211; it is far better to build security into an application than trying to firefight after development. If you are looking for a solution to your mobile app security challenges, CloudNow has a range of services to offer &#8211; <\/span><\/i><a href=\"https:\/\/www.cloudnowtech.com\/contact-us.html\"><i><span style=\"font-weight: 400;\">talk to us<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> today.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Current location, banking information, personal information&#8230; there are no limits to what a breach in mobile security can give hackers access to.\u00a0 In a Verizon Mobile Security Index report, it was found that mobile threats were escalating: Around 83% of the organizations surveyed reported they were at risk from mobile threats; 86% said mobile threats [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":2640,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[277],"tags":[296,297],"class_list":["post-2639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-development-modernization","tag-mobile-apps","tag-mobile-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is your mobile app secure? - Discover Better Value Faster<\/title>\n<meta name=\"description\" content=\"#Mobilesecurity risk is rising. In our latest blog post, &quot;Is your mobile app secure?&quot;, learn the major sources of threat to your mobile #app and how to guard against them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is your mobile app secure? - Discover Better Value Faster\" \/>\n<meta property=\"og:description\" content=\"#Mobilesecurity risk is rising. In our latest blog post, &quot;Is your mobile app secure?&quot;, learn the major sources of threat to your mobile #app and how to guard against them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Discover Better Value Faster\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-31T12:31:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-02T06:44:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39.jpeg?fit=1140%2C760&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"760\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SatyaDev Addeppally\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/\",\"name\":\"Discover Better Value Faster\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39.jpeg?fit=1140%2C760&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39.jpeg?fit=1140%2C760&ssl=1\",\"width\":1140,\"height\":760},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#webpage\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/\",\"name\":\"Is your mobile app secure? - Discover Better Value Faster\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#primaryimage\"},\"datePublished\":\"2021-08-31T12:31:42+00:00\",\"dateModified\":\"2021-12-02T06:44:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\"},\"description\":\"#Mobilesecurity risk is rising. In our latest blog post, \\\"Is your mobile app secure?\\\", learn the major sources of threat to your mobile #app and how to guard against them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudnowtech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is your mobile app secure?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\",\"name\":\"SatyaDev Addeppally\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"contentUrl\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"caption\":\"SatyaDev Addeppally\"},\"description\":\"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/satyadevaddepally\/\"],\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is your mobile app secure? - Discover Better Value Faster","description":"#Mobilesecurity risk is rising. In our latest blog post, \"Is your mobile app secure?\", learn the major sources of threat to your mobile #app and how to guard against them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/","og_locale":"en_US","og_type":"article","og_title":"Is your mobile app secure? - Discover Better Value Faster","og_description":"#Mobilesecurity risk is rising. In our latest blog post, \"Is your mobile app secure?\", learn the major sources of threat to your mobile #app and how to guard against them.","og_url":"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/","og_site_name":"Discover Better Value Faster","article_published_time":"2021-08-31T12:31:42+00:00","article_modified_time":"2021-12-02T06:44:59+00:00","og_image":[{"width":1140,"height":760,"url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39.jpeg?fit=1140%2C760&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"SatyaDev Addeppally","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.cloudnowtech.com\/blog\/#website","url":"https:\/\/www.cloudnowtech.com\/blog\/","name":"Discover Better Value Faster","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#primaryimage","inLanguage":"en-US","url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39.jpeg?fit=1140%2C760&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39.jpeg?fit=1140%2C760&ssl=1","width":1140,"height":760},{"@type":"WebPage","@id":"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#webpage","url":"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/","name":"Is your mobile app secure? - Discover Better Value Faster","isPartOf":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#primaryimage"},"datePublished":"2021-08-31T12:31:42+00:00","dateModified":"2021-12-02T06:44:59+00:00","author":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6"},"description":"#Mobilesecurity risk is rising. In our latest blog post, \"Is your mobile app secure?\", learn the major sources of threat to your mobile #app and how to guard against them.","breadcrumb":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudnowtech.com\/blog\/is-your-mobile-app-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudnowtech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Is your mobile app secure?"}]},{"@type":"Person","@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6","name":"SatyaDev Addeppally","image":{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","contentUrl":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","caption":"SatyaDev Addeppally"},"description":"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.","sameAs":["https:\/\/www.linkedin.com\/in\/satyadevaddepally\/"],"url":"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-39.jpeg?fit=1140%2C760&ssl=1","_links":{"self":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/2639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/comments?post=2639"}],"version-history":[{"count":4,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/2639\/revisions"}],"predecessor-version":[{"id":3154,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/2639\/revisions\/3154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media\/2640"}],"wp:attachment":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media?parent=2639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/categories?post=2639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/tags?post=2639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}