{"id":22133919,"date":"2026-04-27T18:10:51","date_gmt":"2026-04-27T16:10:51","guid":{"rendered":"https:\/\/netmind.net\/sin-categorizar\/ia-filtracion-datos-seguridad\/"},"modified":"2026-04-27T18:59:10","modified_gmt":"2026-04-27T16:59:10","slug":"ai-data-leakage-security","status":"publish","type":"post","link":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/","title":{"rendered":"ABC | AI becomes a Trojan horse for data leakage"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22133919\" class=\"elementor elementor-22133919 elementor-22133900\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d1739b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d1739b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b1d9dd4\" data-id=\"b1d9dd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f9b5a09 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f9b5a09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"123\" data-end=\"439\">The accelerated adoption of artificial intelligence in companies is opening up new opportunities, but also <strong>significant risks in terms of security and data management.<\/strong> In many cases, the lack of control and proper training is turning the use of these tools into a critical point of exposure for sensitive information.<\/p><p data-start=\"441\" data-end=\"934\">In this context, the article published by <strong><em data-start=\"483\" data-end=\"488\">ABC<\/em><\/strong> analyzes how phenomena such as <strong><em data-start=\"520\" data-end=\"531\">shadow AI<\/em> <\/strong>are facilitating data leaks within organizations. Through the perspective of experts like <strong>Isaac Cantalejo, Managing Director at Netmind and Vice President at BTS<\/strong>, it highlights that the problem is not only technological, but also cultural and organizational. The absence of clear policies, proper training, and governance models is creating an environment where risks grow at the same pace as adoption.<\/p><p data-start=\"936\" data-end=\"1145\">If you want to understand how artificial intelligence can become a risk when not properly managed and what this means for enterprise security, we invite you to read the full article through the following link.<\/p><p data-start=\"543\" data-end=\"934\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81f5c6b elementor-widget elementor-widget-spacer\" data-id=\"81f5c6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-099cd49 elementor-widget elementor-widget-spacer\" data-id=\"099cd49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c40d469 elementor-cta--layout-image-below elementor-cta--valign-middle elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"c40d469\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tRead the full article here\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item \">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.abc.es\/economia\/ia-convierte-caballo-troya-filtracion-datos-20260427101148-nt.html?ref=https%3A%2F%2Fwww.abc.es%2Feconomia%2Fia-convierte-caballo-troya-filtracion-datos-20260427101148-nt.html%3Fref%3Dhttps%3A%2F%2Fwww.abc.es%2Feconomia%2Fia-convierte-caballo-troya-filtracion-datos-20260427101148-nt.html\" target=\"_blank\">\n\t\t\t\t\t\tPress article\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Uncontrolled AI adoption exposes sensitive data. Learn how shadow AI is driving security risks and vulnerabilities.<\/p>\n","protected":false},"author":1234,"featured_media":22133908,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22001329],"tags":[],"best_practice":[],"authors_rel":[22001658],"class_list":["post-22133919","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI becomes a Trojan horse for data leakage<\/title>\n<meta name=\"description\" content=\"Uncontrolled AI adoption exposes sensitive data. Learn how shadow AI is driving security risks and vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ABC | AI becomes a Trojan horse for data leakage\" \/>\n<meta property=\"og:description\" content=\"Uncontrolled AI adoption exposes sensitive data. Learn how shadow AI is driving security risks and vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Netmind\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-27T16:10:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T16:59:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netmind.net\/wp-content\/uploads\/2026\/03\/1bb16185-cbf0-449e-b376-cf8c4d8c80d4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Isaac Cantalejo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Kanban con un toque de IA: Superpoderes para organizar y priorizar mejor\" \/>\n<meta name=\"twitter:description\" content=\"La IA ha llegado para quedarse y revolucionarlo todo, principalmente, nuestra forma de trabajar. Este art\u00edculo explora c\u00f3mo la IA puede amplificar la potencia de Kanban para transformar la gesti\u00f3n \u00e1gil de los proyectos, servicios y productos con la automatizaci\u00f3n de tareas y la optimizaci\u00f3n de flujos de trabajo, la priorizaci\u00f3n inteligente y los an\u00e1lisis predictivos.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/netmind.net\/wp-content\/uploads\/2016\/02\/imgdestacada-web_blog-scaled.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Isaac Cantalejo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/\"},\"author\":{\"name\":\"Isaac Cantalejo\",\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/#\\\/schema\\\/person\\\/c117c3ea992b75c357cdedc781299ab2\"},\"headline\":\"ABC | AI becomes a Trojan horse for data leakage\",\"datePublished\":\"2026-04-27T16:10:51+00:00\",\"dateModified\":\"2026-04-27T16:59:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/\"},\"wordCount\":176,\"publisher\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netmind.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2618832121-scaled.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/\",\"url\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/\",\"name\":\"AI becomes a Trojan horse for data leakage\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netmind.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2618832121-scaled.jpg\",\"datePublished\":\"2026-04-27T16:10:51+00:00\",\"dateModified\":\"2026-04-27T16:59:10+00:00\",\"description\":\"Uncontrolled AI adoption exposes sensitive data. Learn how shadow AI is driving security risks and vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netmind.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2618832121-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/netmind.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2618832121-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/news\\\/ai-data-leakage-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netmind.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/netmind.net\\\/en\\\/category\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ABC | AI becomes a Trojan horse for data leakage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netmind.net\\\/en\\\/\",\"name\":\"Netmind\",\"description\":\"Digital Business Transformation | Agile Transformation | Business Analysis\",\"publisher\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netmind.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/#organization\",\"name\":\"Netmind\",\"url\":\"https:\\\/\\\/netmind.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netmind.net\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/NM-BTS-Logo-2021_Blue-1.svg\",\"contentUrl\":\"https:\\\/\\\/netmind.net\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/NM-BTS-Logo-2021_Blue-1.svg\",\"width\":360.64,\"height\":82,\"caption\":\"Netmind\"},\"image\":{\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netmind.net\\\/en\\\/#\\\/schema\\\/person\\\/c117c3ea992b75c357cdedc781299ab2\",\"name\":\"Isaac Cantalejo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/01d6e701b1ac7cd61d8a26a0b8c9104ba4dd7698c2d202b2edd5ed7ac2acab35?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/01d6e701b1ac7cd61d8a26a0b8c9104ba4dd7698c2d202b2edd5ed7ac2acab35?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/01d6e701b1ac7cd61d8a26a0b8c9104ba4dd7698c2d202b2edd5ed7ac2acab35?s=96&r=g\",\"caption\":\"Isaac Cantalejo\"},\"sameAs\":[\"http:\\\/\\\/netmind.net\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI becomes a Trojan horse for data leakage","description":"Uncontrolled AI adoption exposes sensitive data. Learn how shadow AI is driving security risks and vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/","og_locale":"en_US","og_type":"article","og_title":"ABC | AI becomes a Trojan horse for data leakage","og_description":"Uncontrolled AI adoption exposes sensitive data. Learn how shadow AI is driving security risks and vulnerabilities.","og_url":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/","og_site_name":"Netmind","article_published_time":"2026-04-27T16:10:51+00:00","article_modified_time":"2026-04-27T16:59:10+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/netmind.net\/wp-content\/uploads\/2026\/03\/1bb16185-cbf0-449e-b376-cf8c4d8c80d4.png","type":"image\/png"}],"author":"Isaac Cantalejo","twitter_card":"summary_large_image","twitter_title":"Kanban con un toque de IA: Superpoderes para organizar y priorizar mejor","twitter_description":"La IA ha llegado para quedarse y revolucionarlo todo, principalmente, nuestra forma de trabajar. Este art\u00edculo explora c\u00f3mo la IA puede amplificar la potencia de Kanban para transformar la gesti\u00f3n \u00e1gil de los proyectos, servicios y productos con la automatizaci\u00f3n de tareas y la optimizaci\u00f3n de flujos de trabajo, la priorizaci\u00f3n inteligente y los an\u00e1lisis predictivos.","twitter_image":"https:\/\/netmind.net\/wp-content\/uploads\/2016\/02\/imgdestacada-web_blog-scaled.jpg","twitter_misc":{"Written by":"Isaac Cantalejo","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/#article","isPartOf":{"@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/"},"author":{"name":"Isaac Cantalejo","@id":"https:\/\/netmind.net\/en\/#\/schema\/person\/c117c3ea992b75c357cdedc781299ab2"},"headline":"ABC | AI becomes a Trojan horse for data leakage","datePublished":"2026-04-27T16:10:51+00:00","dateModified":"2026-04-27T16:59:10+00:00","mainEntityOfPage":{"@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/"},"wordCount":176,"publisher":{"@id":"https:\/\/netmind.net\/en\/#organization"},"image":{"@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/#primaryimage"},"thumbnailUrl":"https:\/\/netmind.net\/wp-content\/uploads\/2026\/04\/shutterstock_2618832121-scaled.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/","url":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/","name":"AI becomes a Trojan horse for data leakage","isPartOf":{"@id":"https:\/\/netmind.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/#primaryimage"},"image":{"@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/#primaryimage"},"thumbnailUrl":"https:\/\/netmind.net\/wp-content\/uploads\/2026\/04\/shutterstock_2618832121-scaled.jpg","datePublished":"2026-04-27T16:10:51+00:00","dateModified":"2026-04-27T16:59:10+00:00","description":"Uncontrolled AI adoption exposes sensitive data. Learn how shadow AI is driving security risks and vulnerabilities.","breadcrumb":{"@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/#primaryimage","url":"https:\/\/netmind.net\/wp-content\/uploads\/2026\/04\/shutterstock_2618832121-scaled.jpg","contentUrl":"https:\/\/netmind.net\/wp-content\/uploads\/2026\/04\/shutterstock_2618832121-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/netmind.net\/en\/news\/ai-data-leakage-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netmind.net\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/netmind.net\/en\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ABC | AI becomes a Trojan horse for data leakage"}]},{"@type":"WebSite","@id":"https:\/\/netmind.net\/en\/#website","url":"https:\/\/netmind.net\/en\/","name":"Netmind","description":"Digital Business Transformation | Agile Transformation | Business Analysis","publisher":{"@id":"https:\/\/netmind.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netmind.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netmind.net\/en\/#organization","name":"Netmind","url":"https:\/\/netmind.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netmind.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netmind.net\/wp-content\/uploads\/2020\/08\/NM-BTS-Logo-2021_Blue-1.svg","contentUrl":"https:\/\/netmind.net\/wp-content\/uploads\/2020\/08\/NM-BTS-Logo-2021_Blue-1.svg","width":360.64,"height":82,"caption":"Netmind"},"image":{"@id":"https:\/\/netmind.net\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/netmind.net\/en\/#\/schema\/person\/c117c3ea992b75c357cdedc781299ab2","name":"Isaac Cantalejo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/01d6e701b1ac7cd61d8a26a0b8c9104ba4dd7698c2d202b2edd5ed7ac2acab35?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/01d6e701b1ac7cd61d8a26a0b8c9104ba4dd7698c2d202b2edd5ed7ac2acab35?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/01d6e701b1ac7cd61d8a26a0b8c9104ba4dd7698c2d202b2edd5ed7ac2acab35?s=96&r=g","caption":"Isaac Cantalejo"},"sameAs":["http:\/\/netmind.net"]}]}},"_links":{"self":[{"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/posts\/22133919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/users\/1234"}],"replies":[{"embeddable":true,"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/comments?post=22133919"}],"version-history":[{"count":5,"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/posts\/22133919\/revisions"}],"predecessor-version":[{"id":22133926,"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/posts\/22133919\/revisions\/22133926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/media\/22133908"}],"wp:attachment":[{"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/media?parent=22133919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/categories?post=22133919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/tags?post=22133919"},{"taxonomy":"best_practice","embeddable":true,"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/best_practice?post=22133919"},{"taxonomy":"authors_rel","embeddable":true,"href":"https:\/\/netmind.net\/en\/wp-json\/wp\/v2\/authors_rel?post=22133919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}