{"id":18372,"date":"2024-07-11T12:16:34","date_gmt":"2024-07-11T12:16:34","guid":{"rendered":"https:\/\/acora.s.nomatter.dev\/?p=18372"},"modified":"2025-01-10T11:09:01","modified_gmt":"2025-01-10T11:09:01","slug":"overcoming-traditional-soc-failures","status":"publish","type":"post","link":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/","title":{"rendered":"Overcoming Traditional SOC Failures"},"content":{"rendered":"<h2><span class=\"ez-toc-section\" id=\"A_Blueprint_for_a_Best-of-Breed_SOC\"><\/span>A Blueprint for a Best-of-Breed SOC<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A Security Operations Centre (SOC) is a centralised unit that monitors, detects, responds and prevents cyberattacks on an organisation\u2019s assets. A SOC typically consists of a team of security analysts, engineers, incident responders and threat hunters, who use various tools and technologies to protect the organisation from cyber threats. However, not all SOCs are created equal. In our latest post, we explore these and consider how overcoming SOC failures can bring significant results.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_a_traditional_SOC_will_fail\"><\/span>Why a traditional SOC will fail<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Many traditional SOCs suffer challenges and pitfalls that limit their effectiveness and efficiency. Some of these challenges are:<\/p>\n<h3><strong>Lack of Context and Visibility<\/strong><\/h3>\n<p>Traditional SOCs often rely on many disparate tools and data sources, such as firewalls, antivirus, network devices, endpoints, logs, feeds and alerts. However, these tools and data sources do not provide a holistic and unified view of the organisation\u2019s security posture and threat landscape. Moreover, they do not provide enough context and correlation to help the SOC analysts understand an incident&#8217;s root cause, impact and scope. As a result, the SOC analysts have to spend a lot of time and resources on manual investigation, triage and remediation, which can lead to alert fatigue, missed incidents and false positives.<\/p>\n<h3><strong>Lack of Scalability and Agility<\/strong><\/h3>\n<p>Traditional SOCs often struggle to keep up with the increasing volume, velocity and variety of cyber threats and data. They also face difficulties adapting to the changing business needs and requirements, such as new regulations, technologies, processes and services. Moreover, they cannot automate and orchestrate their workflows and tasks, which can result in inefficiencies, errors and delays. As a result, the SOC analysts have to deal with a lot of complexity, redundancy and inconsistency, which can affect their productivity, performance and morale.<\/p>\n<h3><strong>Lack of Alignment and Integration<\/strong><\/h3>\n<p>Traditional SOCs often operate in silos, without proper alignment and integration with the rest of the organisation. They do not have a clear understanding of the business goals, priorities and risks, and they do not communicate and collaborate effectively with other stakeholders, such as IT, DevOps, compliance, legal, etc. Moreover, they do not leverage feedback and input from other sources, such as threat intelligence, vulnerability management, penetration testing, etc. As a result, the SOC analysts have a limited and narrow perspective of the organisation\u2019s security needs and challenges, which can lead to misalignment, gaps and conflicts.<\/p>\n<p>These challenges can undermine a traditional SOC&#8217;s value and effectiveness, exposing the organisation to greater risks and costs. Therefore, it is imperative to rethink and redesign the SOC model and adopt a more modern and innovative approach to overcome these challenges and deliver business-driven and valuable outcomes.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_build_a_best-in-class_SOC\"><\/span>How to build a best-in-class SOC<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A Best-in-class SOC is designed with engineering at the forefront and focuses on contextualising the SIEM and SOAR services based on the business needs and objectives. This should provide:<\/p>\n<h3><strong>Provide visibility and context<\/strong><\/h3>\n<p>A Best-in-class SOC leverages a single, integrated, scalable platform that can collect, analyse and correlate data from various sources and tools and provide a comprehensive and coherent view of the organisation\u2019s security posture and threat landscape. It also enriches and enhances the data with relevant and actionable context, such as threat intelligence, asset inventory, user behaviour, business impact, etc., to help the SOC analysts understand the who, what, when, where, why and how of an incident, and to prioritise and respond accordingly.<\/p>\n<h3><strong>Enable Scalability and Agility<\/strong><\/h3>\n<p>A Best-in-class SOC utilises a cloud-based, elastic and flexible architecture that can scale up and down as needed and support the ingestion and processing of large and diverse data sets. It should also leverage automation and orchestration capabilities to streamline and optimise workflows and tasks, enabling the SOC analysts to perform faster and more accurate actions, such as detection, investigation, containment, eradication, recovery and reporting. Culturally, it also should embrace a continuous improvement and innovation mindset that can adapt and evolve with the ever-changing business and security needs\/requirements.<\/p>\n<h3><strong>Ensure Alignment and Integration<\/strong><\/h3>\n<p>A Best-in-class SOC aligns and integrates with the rest of the organisation and has a clear understanding of the business goals, priorities and risks. It also communicates and collaborates effectively with other stakeholders and leverages their feedback and input to improve the security strategy and operations. It must incorporate the results and recommendations from other sources, such as vulnerability management, offensive testing, etc., to validate and verify the security controls and measures and identify and address gaps and weaknesses.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"An_Attack_Informs_Defence_Approach\"><\/span>An Attack Informs Defence Approach<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One of the key themes that can help a Best-in-class SOC achieve these objectives is using offensive testing to inform and improve the SIEM and SOAR services and the overarching SOC capability. Offensive testing, also known as purple teaming, is the practice of simulating real-world cyberattacks on the organisation\u2019s assets, systems and networks to identify and exploit any vulnerabilities and weaknesses and to assess the effectiveness and efficiency of the security defences and responses.<\/p>\n<p>Overcoming SOC failures with Offensive testing provides a SOC with several benefits, such as:<\/p>\n<h3><strong>Identifying and Prioritising the Most Critical and Relevant Threats and Risks<\/strong><\/h3>\n<p>Offensive testing can help a Best-in-class SOC to understand the adversary\u2019s tactics, techniques and procedures (TTPs), and to discover the most likely and impactful attack vectors and scenarios. This can help the SOC to focus on the most critical and urgent threats and risks and to allocate the appropriate resources and actions to mitigate them.<\/p>\n<h3><strong>Validating and Verifying the security controls and measures<\/strong><\/h3>\n<p>Offensive testing can help to evaluate the performance and functionality of the security controls and measures, such as firewalls, antivirus, encryption, etc., and to determine their strengths and weaknesses. This verifies whether the security controls and measures are working as intended and expected and identifies and addresses any gaps and issues.<\/p>\n<h3><strong>Improving and Enhancing the Detection and Response Capabilities<\/strong><\/h3>\n<p>Offensive testing helps the SOC to test and measure their detection and response capabilities to validate visibility gaps, detect in-depth failures and continually assess, assure and mature the alarms, alerts, rules, policies and procedures which make up the overarching SOC.<\/p>\n<p>A traditional SOC is not enough to cope with the increasing and evolving cyber threats and challenges. One designed with engineering at the forefront, focusing on contextualising the SIEM and SOAR services based on the business needs and objectives will drive optimal outcomes and move the SOC from a cost centre to a business enabler.<\/p>\n<p>Acora&#8217;s <a href=\"https:\/\/acora.s.nomatter.dev\/our-services\/managed-services\/cyber-security\/managed-soc\/\">Managed SOC Services<\/a> provide visibility and context, enable scalability and agility, and ensure alignment and integration. At the heart of this is our philosophy and approach, which uses offensive testing to inform and improve the SIEM and SOAR capabilities and the overarching SOC service by identifying and prioritising the most critical and relevant threats and risks, validating and verifying the security controls and measures, and improving and enhancing the detection and response capabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Blueprint for a Best-of-Breed SOC A Security Operations Centre (SOC) is a centralised unit that monitors, detects, responds and prevents cyberattacks on an organisation\u2019s assets. A SOC typically consists of a team of security analysts, engineers, incident responders and&#8230;<\/p>\n","protected":false},"author":16,"featured_media":18629,"comment_status":"closed","ping_status":"open","sticky":false,"template":"single-resources-gated-content.blade.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[348],"tags":[],"class_list":["post-18372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcements"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Overcoming Traditional SOC Failures | Acora<\/title>\n<meta name=\"description\" content=\"Not all SOCS are equal, and traditionally, overcoming SOC failures arise from challenges and pitfalls that limit their effectiveness.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Overcoming Traditional SOC Failures\" \/>\n<meta property=\"og:description\" content=\"Not all SOCS are equal, and traditionally, overcoming SOC failures arise from challenges and pitfalls that limit their effectiveness.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora NL Test\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-11T12:16:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T11:09:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/SOC-Failings-Blog-Acora-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Acora Press Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Acora Press Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/\"},\"author\":{\"name\":\"The Acora Press Team\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\"},\"headline\":\"Overcoming Traditional SOC Failures\",\"datePublished\":\"2024-07-11T12:16:34+00:00\",\"dateModified\":\"2025-01-10T11:09:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/\"},\"wordCount\":1146,\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/07\\\/SOC-Failings-Blog-Acora.png\",\"articleSection\":[\"Announcements\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/\",\"name\":\"Overcoming Traditional SOC Failures | Acora\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/07\\\/SOC-Failings-Blog-Acora.png\",\"datePublished\":\"2024-07-11T12:16:34+00:00\",\"dateModified\":\"2025-01-10T11:09:01+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\"},\"description\":\"Not all SOCS are equal, and traditionally, overcoming SOC failures arise from challenges and pitfalls that limit their effectiveness.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/07\\\/SOC-Failings-Blog-Acora.png\",\"contentUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/07\\\/SOC-Failings-Blog-Acora.png\",\"width\":1920,\"height\":1080,\"caption\":\"SOC Failings Blog Acora\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/overcoming-traditional-soc-failures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Announcements\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/category\\\/announcements\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Overcoming Traditional SOC Failures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\",\"name\":\"Acora NL Test\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\",\"name\":\"The Acora Press Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"caption\":\"The Acora Press Team\"},\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/author\\\/marketingteamacora-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Overcoming Traditional SOC Failures | Acora","description":"Not all SOCS are equal, and traditionally, overcoming SOC failures arise from challenges and pitfalls that limit their effectiveness.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Overcoming Traditional SOC Failures","og_description":"Not all SOCS are equal, and traditionally, overcoming SOC failures arise from challenges and pitfalls that limit their effectiveness.","og_url":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/","og_site_name":"Acora NL Test","article_published_time":"2024-07-11T12:16:34+00:00","article_modified_time":"2025-01-10T11:09:01+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/SOC-Failings-Blog-Acora-1024x576.png","type":"image\/png"}],"author":"The Acora Press Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"The Acora Press Team","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/#article","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/"},"author":{"name":"The Acora Press Team","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267"},"headline":"Overcoming Traditional SOC Failures","datePublished":"2024-07-11T12:16:34+00:00","dateModified":"2025-01-10T11:09:01+00:00","mainEntityOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/"},"wordCount":1146,"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/SOC-Failings-Blog-Acora.png","articleSection":["Announcements"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/","url":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/","name":"Overcoming Traditional SOC Failures | Acora","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/#primaryimage"},"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/SOC-Failings-Blog-Acora.png","datePublished":"2024-07-11T12:16:34+00:00","dateModified":"2025-01-10T11:09:01+00:00","author":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267"},"description":"Not all SOCS are equal, and traditionally, overcoming SOC failures arise from challenges and pitfalls that limit their effectiveness.","breadcrumb":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/#primaryimage","url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/SOC-Failings-Blog-Acora.png","contentUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/SOC-Failings-Blog-Acora.png","width":1920,"height":1080,"caption":"SOC Failings Blog Acora"},{"@type":"BreadcrumbList","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/overcoming-traditional-soc-failures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acora.s.nomatter.dev\/nltest\/"},{"@type":"ListItem","position":2,"name":"Announcements","item":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/category\/announcements\/"},{"@type":"ListItem","position":3,"name":"Overcoming Traditional SOC Failures"}]},{"@type":"WebSite","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website","url":"https:\/\/acora.s.nomatter.dev\/nltest\/","name":"Acora NL Test","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acora.s.nomatter.dev\/nltest\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267","name":"The Acora Press Team","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","caption":"The Acora Press Team"},"url":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/author\/marketingteamacora-com\/"}]}},"_links":{"self":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts\/18372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/comments?post=18372"}],"version-history":[{"count":13,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts\/18372\/revisions"}],"predecessor-version":[{"id":18433,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts\/18372\/revisions\/18433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media\/18629"}],"wp:attachment":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media?parent=18372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/categories?post=18372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/tags?post=18372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}