{"id":76503,"date":"2025-05-04T14:48:36","date_gmt":"2025-05-04T11:48:36","guid":{"rendered":"https:\/\/gulftech-news.com\/en\/?p=76503"},"modified":"2025-05-04T14:48:37","modified_gmt":"2025-05-04T11:48:37","slug":"behavioral-economics-of-enterprise-password-management","status":"publish","type":"post","link":"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/","title":{"rendered":"Behavioral economics of enterprise password management"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"1024\" src=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/05\/\u0646\u064a\u0631\u064a\u0634-\u0633\u0648\u0627\u0645\u064a\u060c-\u0645\u062d\u0644\u0644-\u0627\u0644\u0645\u0624\u0633\u0633\u0629-\u0644\u062f\u0649-\u0634\u0631\u0643\u0629-\u0645\u0627\u0646\u064a\u062c-\u0625\u0646\u062c\u0646--770x1024.jpeg\" alt=\"\" class=\"wp-image-76504\" srcset=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/05\/\u0646\u064a\u0631\u064a\u0634-\u0633\u0648\u0627\u0645\u064a\u060c-\u0645\u062d\u0644\u0644-\u0627\u0644\u0645\u0624\u0633\u0633\u0629-\u0644\u062f\u0649-\u0634\u0631\u0643\u0629-\u0645\u0627\u0646\u064a\u062c-\u0625\u0646\u062c\u0646--770x1024.jpeg?v=1746359240 770w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/05\/\u0646\u064a\u0631\u064a\u0634-\u0633\u0648\u0627\u0645\u064a\u060c-\u0645\u062d\u0644\u0644-\u0627\u0644\u0645\u0624\u0633\u0633\u0629-\u0644\u062f\u0649-\u0634\u0631\u0643\u0629-\u0645\u0627\u0646\u064a\u062c-\u0625\u0646\u062c\u0646--226x300.jpeg?v=1746359240 226w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/05\/\u0646\u064a\u0631\u064a\u0634-\u0633\u0648\u0627\u0645\u064a\u060c-\u0645\u062d\u0644\u0644-\u0627\u0644\u0645\u0624\u0633\u0633\u0629-\u0644\u062f\u0649-\u0634\u0631\u0643\u0629-\u0645\u0627\u0646\u064a\u062c-\u0625\u0646\u062c\u0646--768x1021.jpeg?v=1746359240 768w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/05\/\u0646\u064a\u0631\u064a\u0634-\u0633\u0648\u0627\u0645\u064a\u060c-\u0645\u062d\u0644\u0644-\u0627\u0644\u0645\u0624\u0633\u0633\u0629-\u0644\u062f\u0649-\u0634\u0631\u0643\u0629-\u0645\u0627\u0646\u064a\u062c-\u0625\u0646\u062c\u0646-.jpeg?v=1746359240 963w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><figcaption class=\"wp-element-caption\">Niresh Swamy, Enterprise Analyst at ManageEngine<\/figcaption><\/figure>\n\n\n\n<p><strong>Written by: Niresh Swamy, Enterprise Analyst at ManageEngine<\/strong><\/p>\n\n\n\n<p><strong><br><\/strong>When someone asks how you start a typical weekday, your answer likely includes the usual suspects, be it waking up, brewing coffee, or maybe even a quick scroll through the news. But almost inevitably, in the post-pandemic world where remote work has become commonplace, it also includes logging in to work.<\/p>\n\n\n\n<p><br>Buried in this mundane act is a timeless truth we often overlook. It\u2019s part of a modern ritual that every hybrid worker performs quietly, instinctively, like it&#8217;s muscle memory\u2014a ritual that organizations everywhere rely on, day in and day out, to protect their business integrity.<\/p>\n\n\n\n<p><br>It\u2019s not glamorous. It\u2019s rarely questioned. But it defines the frontline of enterprise security: It\u2019s the password routine.<\/p>\n\n\n\n<p><br>While the password routine is something that is of importance to organizations, for employees, it is simply a part of the daily grind, an afterthought tucked between calendar invites and coffee refills, driven more by habit than by a conscious understanding of its security implications.<\/p>\n\n\n\n<p><br><strong>The subtle art of choosing a password<\/strong><\/p>\n\n\n\n<p><strong><br><\/strong>So, this is how it goes, right?<br>When you join an organization, you are added to their corporate network. Immediately, you are instructed to choose a password that you will use to log in to work, remotely or otherwise.<br>Now let&#8217;s be honest, at this particular juncture, how many of us put the security of the organization over our everyday convenience?<\/p>\n\n\n\n<p><br>Yes, there are organizational policies that demand that you choose complex passwords. But let\u2019s face it, most of us still choose the nearest mental shortcut\u2014the very same password we\u2019ve used for years in other places, tweaked just enough to meet the bare minimum requirements, likely written down somewhere.<\/p>\n\n\n\n<p><br>Alright, let\u2019s say we do this for organizational routines where forgetting a password is a hassle, because there are compliance policies to navigate, reset procedures to follow, and IT support to involve. In a bureaucratic work setting like that, reusing an easy-to-remember password makes a certain kind of sense. We, however, carry the same behavior into our personal lives too, where support is limited and the consequences of a breach can be far more personal, yet we often choose convenience over security.<\/p>\n\n\n\n<p><br>We know password reuse is bad. So, why do we still do it?<br>Organizations tend to overlook this underlying behavioral pattern and instead respond by piling on layers of compliance training and rigid security protocols over already burdensome password routines. This is because they often choose to treat password misbehavior by their workforce as a knowledge problem. They assume that if employees knew better, they&#8217;d practice better password hygiene.<\/p>\n\n\n\n<p><br>That&#8217;s just not it. This behavior is due to deeply hard-coded cognitive biases that drive us towards making decisions that express our wariness towards anything that falls beyond the boundaries of the familiar.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br><strong>Bounded rationality<\/strong><\/h2>\n\n\n\n<p><strong><br><\/strong>Just enough is good enough.<br>The concept suggests that when people are bounded by limits such as time, information, and cognitive resources, they don&#8217;t seek to make the perfect decision, but rather choose to settle with a satisfactory one.<\/p>\n\n\n\n<p>We aren\u2019t trying to get security wrong. We are simply trying to get our job done. Managing passwords is mentally exhausting, so we settle for shortcuts like browser autofill or reused passwords. It is not laziness. It&#8217;s simply an efficient trade-off in our mental cost benefit calculation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Availability heuristic<\/h2>\n\n\n\n<p><br>If I remember it, it must be right.<br>This cognitive bias suggests that people verify the integrity or truth of something based on how easily they can recall an example or piece of information to justify it. The more recent or personal it is, the more integral or secure people feel regardless of actual evidence.<\/p>\n\n\n\n<p><br>We manage passwords the same way we manage memories: by leaning on what\u2019s easiest to recall. So, we stick with variations of the same password or reuse ones from other accounts. We don&#8217;t choose these passwords because they are secure, which they aren&#8217;t, but because they are cognitively available. We equate memorability with safety, even when that makes us more vulnerable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Loss aversion<\/h2>\n\n\n\n<p><br>I\u2019d rather not lose access than make it more secure.<br>This cognitive principle refers to the fact that people feel the pain of loss more vividly than they feel the pleasure of potential gains.<\/p>\n\n\n\n<p><br>For many users, the fear of being locked out feels more immediate than the risk of a cyberattack. This anxiety drives habits like writing passwords down, reusing passwords from personal accounts, or using system defaults. It is not that people do not understand the risks. It is that the need for uninterrupted access often outweighs the promise of long-term protection.<\/p>\n\n\n\n<p><br>Expecting perfect decisions from a workforce in imperfect circumstances often proves futile. If secure behavior feels like a burden, it means the system wasn\u2019t built with people in mind. While security practices could be inculcated with a training video, the buck does not stop there.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Bridging the gap between the familiar and the secure<\/h2>\n\n\n\n<p><br>To truly support secure behavior at scale, organizations must take the burden of password management out of employees\u2019 hands. Organizations need to reduce the likelihood of human error and bypass the biases that lead to password fatigue, reuse, or insecure storage. The best way to prevent risky password behavior is to remove the need for passwords altogether.<br>Adoption of authentication tools that allow the use of passkeys, SSO, and magic links remove the friction points where users typically falter.<\/p>\n\n\n\n<p>Passkeys are a shift in default behavior. Instead of forcing users to recall or manage credentials, passkeys use device-bound cryptographic keys that sync securely across devices. In places where passkeys can&#8217;t be applied, SSO can be enabled for cross-organzational access. SSO streamlines access across platforms with a single credential or authentication touchpoint. By centralizing login, users aren\u2019t juggling dozens of entry points.<\/p>\n\n\n\n<p><br>To further eliminate the biases that interfere with password management, organizations can take advantage of the use of passkey-enabled vaults that take away the need for password management by the individual. Once these systems are in place, organizations can then, with training that enables value-based engagement, show employees how these systems make security go hand-in-hand with productivity.<\/p>\n\n\n\n<p><br>These upgrades bypass bounded rationality by removing the mental strain of managing access under pressure because the fewer decisions people need to make, the fewer chances they have to settle for whatever gets them through the day. And when there\u2019s nothing to remember, the availability bias has no room to work its illusion. The choice disappears, therefore so does the risk. For users who fear getting locked out more than being breached, this is a shift that matters, because now they get security without sacrificing access.<\/p>\n\n\n\n<p><br>So when an organization adopts such controls that take away the dependency on the user&#8217;s cognitive biases, they\u2019re not just deploying a security measure. They\u2019re making a behavioral intervention. They\u2019re eliminating the decision points where things go wrong, where people choose what\u2019s easy, not what\u2019s right.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Ensuring policy keeps pace with tech<\/h2>\n\n\n\n<p><br>The transition to a truly secure enterprise can\u2019t rely on technology alone. It must also be reflected at a policy level. Traditional access sharing when it comes to privileged access to critical systems often leaves gaps. For example, in instances when there are scheduled maintenance tasks to be performed on critical domain endpoints, employees rely on shared credentials or manual approval processes, where cognitive shortcuts lead to over-permissioned accounts and stagnant access rights.<\/p>\n\n\n\n<p><br>To counter this, organizations are increasingly turning to passwordless access sharing through privileged access management solutions. These solutions streamline the process by automatically granting, revoking, and auditing access based on predefined policies. PAM solutions ensure that every access is just in time and precisely scoped, removing the need for human intervention.<\/p>\n\n\n\n<p><br>Yet, even the best technical solutions can\u2019t overcome a misaligned policy.<br>In this context, artificial intelligence steps in as a crucial enabler at the policy layer. IT administrators who are meant to supervise privileged access are also human and also go through similar cognitive biases, which would allot access based on previous instances. However, sometimes privileged users might have permissions that they have never used, which might slip under the radar, leading to standing privileges.<\/p>\n\n\n\n<p><br>When artificial intelligence is introduced at this juncture to suggest dynamic privileged access policies based on real-time risk assessments and to detect anomalous behavior, it tends to these unnecessary cognitive interferences.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Recognizing the absurdity in enterprise password management<\/h2>\n\n\n\n<p><br>In The Myth of Sisyphus, Albert Camus tells an absurd story of a man condemned to push a boulder uphill forever, only to watch it roll back down each time. Camus uses this image to explore how, even in repetitive and seemingly meaningless tasks, we search for purpose.<\/p>\n\n\n\n<p><br>In many ways, our daily interactions with security protocols, be it passwords, login prompts, phishing drills, and compliance checklists, feel a lot like Sisyphus&#8217; burden. We&#8217;re expected to stay alert, follow a growing list of rules, and keep up with our actual work. But people don\u2019t function well under constant pressure. Over time, fatigue kicks in, habits take over, and we look for workarounds, not because we don\u2019t care, but because it\u2019s human nature.<\/p>\n\n\n\n<p><br>The solution is not to add more complexity; it&#8217;s to rethink the system. Tools like passkeys, SSO, PAM, and AI do not just improve security. They\u2019re philosophical corrections. They relieve the individual of this absurdity. In doing so, the boulder vanishes, and what remains is a system designed to reflect the reality of people&#8217;s thought processes and cognitive capacities.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Niresh Swamy, Enterprise Analyst at ManageEngine Written by: Niresh Swamy, Enterprise Analyst at ManageEngine When someone asks how you start a typical weekday, your answer likely includes the usual suspects, be it waking up, brewing coffee, or maybe even a quick scroll through the news. But almost inevitably, in the post-pandemic world where remote work &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[2295,999],"class_list":["post-76503","post","type-post","status-publish","format-standard","hentry","category-news","tag-behavioral-economics","tag-manageengine"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Behavioral economics of enterprise password management - Gulf Tech News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Behavioral economics of enterprise password management - Gulf Tech News\" \/>\n<meta property=\"og:description\" content=\"Niresh Swamy, Enterprise Analyst at ManageEngine Written by: Niresh Swamy, Enterprise Analyst at ManageEngine When someone asks how you start a typical weekday, your answer likely includes the usual suspects, be it waking up, brewing coffee, or maybe even a quick scroll through the news. But almost inevitably, in the post-pandemic world where remote work &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Gulf Tech News\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-04T11:48:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-04T11:48:37+00:00\" \/>\n<meta name=\"author\" content=\"bessan helmi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bessan helmi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/\",\"url\":\"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/\",\"name\":\"Behavioral economics of enterprise password management - Gulf Tech News\",\"isPartOf\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\"},\"datePublished\":\"2025-05-04T11:48:36+00:00\",\"dateModified\":\"2025-05-04T11:48:37+00:00\",\"author\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\"},\"breadcrumb\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gulftech-news.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Behavioral economics of enterprise password management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\",\"url\":\"https:\/\/gulftech-news.com\/en\/\",\"name\":\"Gulf Tech News\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gulftech-news.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\",\"name\":\"bessan helmi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"caption\":\"bessan helmi\"},\"url\":\"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Behavioral economics of enterprise password management - Gulf Tech News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/","og_locale":"en_US","og_type":"article","og_title":"Behavioral economics of enterprise password management - Gulf Tech News","og_description":"Niresh Swamy, Enterprise Analyst at ManageEngine Written by: Niresh Swamy, Enterprise Analyst at ManageEngine When someone asks how you start a typical weekday, your answer likely includes the usual suspects, be it waking up, brewing coffee, or maybe even a quick scroll through the news. But almost inevitably, in the post-pandemic world where remote work &hellip;","og_url":"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/","og_site_name":"Gulf Tech News","article_published_time":"2025-05-04T11:48:36+00:00","article_modified_time":"2025-05-04T11:48:37+00:00","author":"bessan helmi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bessan helmi","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/","url":"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/","name":"Behavioral economics of enterprise password management - Gulf Tech News","isPartOf":{"@id":"https:\/\/gulftech-news.com\/en\/#website"},"datePublished":"2025-05-04T11:48:36+00:00","dateModified":"2025-05-04T11:48:37+00:00","author":{"@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c"},"breadcrumb":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gulftech-news.com\/en\/2025\/05\/04\/behavioral-economics-of-enterprise-password-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gulftech-news.com\/en\/"},{"@type":"ListItem","position":2,"name":"Behavioral economics of enterprise password management"}]},{"@type":"WebSite","@id":"https:\/\/gulftech-news.com\/en\/#website","url":"https:\/\/gulftech-news.com\/en\/","name":"Gulf Tech News","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gulftech-news.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c","name":"bessan helmi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","caption":"bessan helmi"},"url":"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/"}]}},"_links":{"self":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/76503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/comments?post=76503"}],"version-history":[{"count":1,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/76503\/revisions"}],"predecessor-version":[{"id":76505,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/76503\/revisions\/76505"}],"wp:attachment":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/media?parent=76503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/categories?post=76503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/tags?post=76503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}