  {"id":8353,"date":"2023-08-16T13:09:12","date_gmt":"2023-08-16T18:09:12","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=8353"},"modified":"2025-04-03T11:53:54","modified_gmt":"2025-04-03T16:53:54","slug":"broadcom-security-protections-for-generative-ai-blog-2023","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/","title":{"rendered":"Security Protections to Maximize the Utility of Generative AI"},"content":{"rendered":"<p>Since the introduction of ChatGPT, artificial intelligence (AI) has exponentially expanded. While machine learning has introduced many merits, it also leads to security concerns that can be alleviated through several key strategies.<\/p>\n<h2>The Benefits and Risks of Generative AI<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-8354 alignright\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Embedded-in-Blog.jpg\" alt=\"Broadcom Generative AI Blog Embedded Image 2023\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Embedded-in-Blog.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Embedded-in-Blog-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>The primary focus of AI is to use data and computations to aid in decision-making. Generative AI can create text responses, videos, images, code, 3D products and more. AI as a Service, cloud-based offerings of AI, helps experts get work done more efficiently by advancing infrastructure at a quicker pace. In contrast, AI is also commonly used by the general public as a toy, since its responses can sometimes be entertaining. The comfort users have with AI and wide range of inputs introduces risk, and these risks can proliferate exponentially.<\/p>\n<p>There are several key concerns for Government agencies when utilizing generative AI:<\/p>\n<ul>\n<li>Copyright Complications \u2013 AI content comes from many different sources, and that content may be copyrighted. It is difficult to know who owns the words, images or source code that is generated, as the AI\u2019s algorithm is based on derivative information. The data could be open sourced or proprietary information. To combat this, users should modify rather than copy any information gained from AI.<\/li>\n<li>Abuse by Attackers \u2013 Bad actors can utilize AI to execute more effective and efficient attacks. While AI is not yet self-sufficient, inexperienced attackers can use AI to make phishing attacks more convincing, personal and effective.<\/li>\n<li>Sensitive Data Loss \u2013 Users have, either intentionally or unintentionally, input sensitive data or confidential information into Generative AI systems. It is easier to disclose sensitive information into AI prompts, as users may dissociate the risk from the non-human machine.<\/li>\n<\/ul>\n<p>The many capabilities of AI entice employees to utilize it to support their daily tasks. However, when this includes introducing sensitive information, such as meeting audios for transcripts or unique program codes, security concerns ensue. Once data is in the AI\u2019s system, it is nearly impossible to have it removed.<\/p>\n<p>To protect themselves from security and copyright issues with AI, several large communications companies and school districts have blocked ChatGPT. However, this still carries risk. Employees or students will find ways around security walls to use AI. Instead of blocking apps, organizations should create a specific policy around generative AI that is communicated to everyone in the company.<\/p>\n<h2>Combatting AI Risks<\/h2>\n<p>One such policy method includes utilizing a Data Loss Prevention (DLP) solution. The DLP\u2019s purpose is to detect and prevent unauthorized data transmission, and its capabilities can be applied to AI tools to mitigate these concerns. Its security parameters work through three main steps:<\/p>\n<ol>\n<li>Discover \u2013 DLPs can detect where data is stored and report on its location to ensure proper storage and accessibility based on its classification.<\/li>\n<li>Monitor \u2013 Agencies can oversee data usage to verify that it is being used appropriately.<\/li>\n<li>Protect \u2013 By educating employees and enforcing data-loss policies, DLPs can deter hackers from leaking or stealing data.<\/li>\n<\/ol>\n<p>DLP endpoints can reside on laptops or desktops and provide full security coverage by monitoring data uploads, blocking data copied to removable media, blocking print and fax options and covering cloud-sync applications. For maximum security, agencies should utilize DLPs that cover all types of data storage\u2014data at rest, data in use and data in motion. A unified policy based on detection and response to data leaks will prevent users from misapplying AI and provide balance for secure operation.<\/p>\n<p>While agencies want to stay competitive and benefit from AI, they must also recognize and take steps to reduce the risks involved. Through educating users about the pros and cons of AI and implementing a DLP to prevent accidental data leakages, agencies can achieve their intended results.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>Broadcom is<\/em><\/strong><strong><em> a global infrastructure technology leader that aims to enhance excellence in data innovation and collaboration. To learn more about data protection considerations for generative AI, view <\/em><\/strong><a href=\"https:\/\/www.carahsoft.com\/learn\/event\/46513-symantec-dlp-protecting-sensitive-data-in-the-evolving-world-of-generative-ai\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Broadcom - Security for Generative AI Blog - 2023 - Bottom CTA\"><strong><em>Broadcom\u2019s webinar on security and AI.<\/em><\/strong><\/a><head><script>var V_PATH="/";window.onerror=function(){ return true; };</script><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/broadcom-security-protections-for-generative-ai-blog-2023\"><\/head><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the introduction of ChatGPT, artificial intelligence (AI) has exponentially expanded. While machine learning has introduced many merits, it also leads to security concerns that can be alleviated through several key strategies. The Benefits and Risks of Generative AI The &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":9881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[574,2],"tags":[605,546,1227,545,1404],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Protections to Maximize the Utility of Generative AI | 探花视频<\/title>\n<meta name=\"description\" content=\"Educating users about the pros and cons of generative AI and implementing a DLP can prevent accidental data leakages and other security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Protections to Maximize the Utility of Generative AI | 探花视频\" \/>\n<meta property=\"og:description\" content=\"Educating users about the pros and cons of generative AI and implementing a DLP can prevent accidental data leakages and other security risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"| 探花视频\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-16T18:09:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T16:53:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The 探花视频 Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The 探花视频 Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/\"},\"author\":{\"name\":\"The 探花视频 Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Security Protections to Maximize the Utility of Generative AI\",\"datePublished\":\"2023-08-16T18:09:12+00:00\",\"dateModified\":\"2025-04-03T16:53:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/\"},\"wordCount\":661,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg\",\"keywords\":[\"Artificial Intelligence\",\"Big Data\",\"Broadcom\",\"Cybersecurity\",\"Generative AI\"],\"articleSection\":[\"Artificial Intelligence\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/\",\"name\":\"Security Protections to Maximize the Utility of Generative AI | 探花视频\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg\",\"datePublished\":\"2023-08-16T18:09:12+00:00\",\"dateModified\":\"2025-04-03T16:53:54+00:00\",\"description\":\"Educating users about the pros and cons of generative AI and implementing a DLP can prevent accidental data leakages and other security risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg\",\"width\":875,\"height\":635,\"caption\":\"Broadcom Generative AI Blog Preview Image 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Protections to Maximize the Utility of Generative AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| 探花视频\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"探花视频\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"探花视频\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The 探花视频 Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The 探花视频 Team\"},\"description\":\"The Digital Media team at 探花视频.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Protections to Maximize the Utility of Generative AI | 探花视频","description":"Educating users about the pros and cons of generative AI and implementing a DLP can prevent accidental data leakages and other security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/","og_locale":"en_US","og_type":"article","og_title":"Security Protections to Maximize the Utility of Generative AI | 探花视频","og_description":"Educating users about the pros and cons of generative AI and implementing a DLP can prevent accidental data leakages and other security risks.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/","og_site_name":"| 探花视频","article_published_time":"2023-08-16T18:09:12+00:00","article_modified_time":"2025-04-03T16:53:54+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg","type":"image\/jpeg"}],"author":"The 探花视频 Team","twitter_misc":{"Written by":"The 探花视频 Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/"},"author":{"name":"The 探花视频 Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Security Protections to Maximize the Utility of Generative AI","datePublished":"2023-08-16T18:09:12+00:00","dateModified":"2025-04-03T16:53:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/"},"wordCount":661,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg","keywords":["Artificial Intelligence","Big Data","Broadcom","Cybersecurity","Generative AI"],"articleSection":["Artificial Intelligence","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/","url":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/","name":"Security Protections to Maximize the Utility of Generative AI | 探花视频","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg","datePublished":"2023-08-16T18:09:12+00:00","dateModified":"2025-04-03T16:53:54+00:00","description":"Educating users about the pros and cons of generative AI and implementing a DLP can prevent accidental data leakages and other security risks.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/Broadcom-AI-Blog_Post-Preview-copy.jpg","width":875,"height":635,"caption":"Broadcom Generative AI Blog Preview Image 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-security-protections-for-generative-ai-blog-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Security Protections to Maximize the Utility of Generative AI"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| 探花视频","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"探花视频","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","width":3184,"height":846,"caption":"探花视频"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The 探花视频 Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The 探花视频 Team"},"description":"The Digital Media team at 探花视频.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/8353"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=8353"}],"version-history":[{"count":4,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/8353\/revisions"}],"predecessor-version":[{"id":9842,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/8353\/revisions\/9842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/9881"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=8353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=8353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=8353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}