{"id":704,"date":"2011-09-22T14:36:56","date_gmt":"2011-09-22T13:36:56","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=704"},"modified":"2019-12-31T12:25:20","modified_gmt":"2019-12-31T11:25:20","slug":"biometrie-ou-en-est-on-dans-les-entreprises","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/","title":{"rendered":"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ?"},"content":{"rendered":"<h4 align=\"left\">On associe souvent biom\u00e9trie et authentification forte. Qu\u2019en pensez-vous ?<\/h4>\n<p>&nbsp;<\/p>\n<p align=\"left\">C\u2019est une erreur assez classique. Authentifier un individu consiste \u00e0 lui demander une preuve de son identit\u00e9. Il existe trois cat\u00e9gories de facteurs d\u2019authentification : ce que je sais, ce que j\u2019ai, ce que je suis.<\/p>\n<p align=\"left\">La biom\u00e9trie peut ainsi permettre d\u2019authentifier une personne, avec cependant une marge d\u2019erreur non n\u00e9gligeable. Ce n\u2019est pas une science exacte : elle d\u00e9pend de la qualit\u00e9 de la solution mise en \u0153uvre (en particulier des capteurs) et du seuil de sensibilit\u00e9 choisi (un compromis est \u00e0 trouver entre ergonomie et s\u00e9curit\u00e9).<\/p>\n<p align=\"left\">Une authentification forte n\u00e9cessite la combinaison d\u2019au moins deux facteurs d\u2019authentification. La biom\u00e9trie seule ne peut donc pas \u00eatre consid\u00e9r\u00e9e comme une authentification forte.<\/p>\n<h4 align=\"left\">Pourquoi les technologies biom\u00e9triques ne sont-elles pas plus largement d\u00e9ploy\u00e9es et utilis\u00e9es ?<\/h4>\n<p>&nbsp;<\/p>\n<p align=\"left\">Effectivement, la biom\u00e9trie est encore relativement peu utilis\u00e9e en entreprise, contrairement aux usages grand public. Les premiers usages sont apparus au milieu du XIX\u00e8me si\u00e8cle comme par exemple l\u2019identification syst\u00e9matique de l\u2019empreinte de la main sur des contrats en Inde pour \u00e9viter l\u2019usurpation d\u2019identit\u00e9 au moment de toucher les salaires. Les d\u00e9ploiements s\u2019acc\u00e9l\u00e8rent aujourd\u2019hui autour des passeports et de cartes d\u2019identit\u00e9 biom\u00e9triques.<\/p>\n<p align=\"left\">M\u00eame si cela a tendance \u00e0 d\u00e9sormais s\u2019estomper, les utilisateurs sont quelque peu r\u00e9ticents d\u00e8s qu\u2019on leur parle de biom\u00e9trie (crainte de l\u2019effet \u00ab Big Brother \u00bb). Par ailleurs, les r\u00e8glementations, notamment la CNIL en France, sont tr\u00e8s contraignantes : tout usage SI de la biom\u00e9trie n\u00e9cessite une demande d\u2019autorisation pr\u00e9alable, et g\u00e9n\u00e9ralement celle-ci n\u2019est pas accord\u00e9e pour les biom\u00e9tries \u00e0 trace utilisant des bases centralis\u00e9es.<\/p>\n<p align=\"left\">Enfin, d\u2019un point de vue technologique, les co\u00fbts d\u2019acquisition importants et l\u2019absence de standardisation et d\u2019interop\u00e9rabilit\u00e9, demeurent \u00e9galement deux freins notables.<\/p>\n<h4 align=\"left\">Finalement, quels sont aujourd\u2019hui les usages de la biom\u00e9trie en entreprise ? Et quelles tendances se dessinent \u00e0 moyen terme ?<\/h4>\n<p>&nbsp;<\/p>\n<p align=\"left\">En entreprise, les d\u00e9ploiements restent encore bien souvent circonscrits \u00e0 des p\u00e9rim\u00e8tres m\u00e9tiers sp\u00e9cifiques et limit\u00e9s \u00e0 quelques centaines de personnes (ex : consolidation financi\u00e8re, trading), voire \u00e0 des vitrines technologiques de la DSI. Seulement quelques entreprises ont d\u00e9ploy\u00e9 des solutions de biom\u00e9trie \/ carte \u00e0 puce sur des p\u00e9rim\u00e8tres plus larges (quelques milliers de personnes).<\/p>\n<p align=\"left\">Le d\u00e9veloppement de nouveaux usages domestiques (lecteurs sur les \u00e9quipements grand public\u2026) et la g\u00e9n\u00e9ralisation des pi\u00e8ces d\u2019identit\u00e9s biom\u00e9triques vont faire entrer ces technologies dans le quotidien des utilisateurs et lever progressivement leurs craintes. De plus, l\u2019essor de la biom\u00e9trie sans trace devrait permettre un assouplissement du cadre r\u00e8glementaire.<\/p>\n<p align=\"left\">Enfin, les co\u00fbts des capteurs individuels devraient baisser significativement dans les ann\u00e9es \u00e0 venir. Tout semble donc r\u00e9uni pour que l\u2019usage de la biom\u00e9trie en entreprise d\u00e9colle\u2026 Reste \u00e0 trouver la \u00ab killer app \u00bb !<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On associe souvent biom\u00e9trie et authentification forte. Qu\u2019en pensez-vous ? &nbsp; C\u2019est une erreur assez classique. Authentifier un individu consiste \u00e0 lui demander une preuve de son identit\u00e9. Il existe trois cat\u00e9gories de facteurs d\u2019authentification : ce que je sais,&#8230;<\/p>\n","protected":false},"author":123,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224],"tags":[164,163,165,3305,3298],"coauthors":[970],"class_list":["post-704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","tag-authentification","tag-biometrie","tag-confiance","tag-identity-access-management","tag-smart-card"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"On associe souvent biom\u00e9trie et authentification forte. Qu\u2019en pensez-vous ? &nbsp; C\u2019est une erreur assez classique. Authentifier un individu consiste \u00e0 lui demander une preuve de son identit\u00e9. Il existe trois cat\u00e9gories de facteurs d\u2019authentification : ce que je sais,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-09-22T13:36:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:25:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Benoit Tanguy\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Benoit Tanguy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/\"},\"author\":{\"name\":\"Benoit Tanguy\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/90ce2c00f0e27d51434993f78876b84c\"},\"headline\":\"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ?\",\"datePublished\":\"2011-09-22T13:36:56+00:00\",\"dateModified\":\"2019-12-31T11:25:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/\"},\"wordCount\":527,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"authentification\",\"Biom\u00e9trie\",\"confiance\",\"identity &amp; access management\",\"smart-card\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/\",\"name\":\"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-09-22T13:36:56+00:00\",\"dateModified\":\"2019-12-31T11:25:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/90ce2c00f0e27d51434993f78876b84c\",\"name\":\"Benoit Tanguy\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/benoit-tanguy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/","og_locale":"en_US","og_type":"article","og_title":"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ? - RiskInsight","og_description":"On associe souvent biom\u00e9trie et authentification forte. Qu\u2019en pensez-vous ? &nbsp; C\u2019est une erreur assez classique. Authentifier un individu consiste \u00e0 lui demander une preuve de son identit\u00e9. Il existe trois cat\u00e9gories de facteurs d\u2019authentification : ce que je sais,...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/","og_site_name":"RiskInsight","article_published_time":"2011-09-22T13:36:56+00:00","article_modified_time":"2019-12-31T11:25:20+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Benoit Tanguy","twitter_misc":{"Written by":"Benoit Tanguy","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/"},"author":{"name":"Benoit Tanguy","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/90ce2c00f0e27d51434993f78876b84c"},"headline":"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ?","datePublished":"2011-09-22T13:36:56+00:00","dateModified":"2019-12-31T11:25:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/"},"wordCount":527,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["authentification","Biom\u00e9trie","confiance","identity &amp; access management","smart-card"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/","name":"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-09-22T13:36:56+00:00","dateModified":"2019-12-31T11:25:20+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/biometrie-ou-en-est-on-dans-les-entreprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Biom\u00e9trie : o\u00f9 en est\u2013on dans les entreprises ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/90ce2c00f0e27d51434993f78876b84c","name":"Benoit Tanguy","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/benoit-tanguy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/123"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=704"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/704\/revisions"}],"predecessor-version":[{"id":6503,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/704\/revisions\/6503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=704"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}