{"id":9994,"date":"2026-02-27T15:17:14","date_gmt":"2026-02-27T15:17:14","guid":{"rendered":"https:\/\/cyberwatch.fr\/?p=9994"},"modified":"2026-04-13T15:50:42","modified_gmt":"2026-04-13T15:50:42","slug":"vulnerability-management-in-the-age-of-generative-ai","status":"publish","type":"post","link":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/","title":{"rendered":"Vulnerability management in the age of generative AI"},"content":{"rendered":"\n<p>At the Cyber-IA expo, Florian Wininger, CTO and co-founder of Cyberwatch, took stock of the current situation and shared his vision of how vulnerability management will evolve in the coming years. In 2025, no fewer than 48,000 CVEs were published, an average of 130 per day. Faced with this explosion, a growing number of them are not being enriched in time, making rapid remediation impossible. AI will become indispensable for identifying, enriching, and prioritizing risks, but also for automating remediation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerabilities on the rise: the end of centralization<\/h2>\n\n\n\n<p>Historically, vulnerability management relied on a central player: the National Vulnerability Database (NVD), managed by the National Institute of Standards and Technology (NIST). Its role was to list CVEs, assign them a severity score (CVSS), and link them to the products concerned (with CPE, Common Platform Enumeration, identifiers).<\/p>\n\n\n\n<p>However, with the explosion in the number of vulnerabilities, the NVD can no longer keep up, resulting in publication delays, missing criticality scores, and a lack of information on affected products. At its <a href=\"https:\/\/www.cybersecuritydive.com\/news\/nist-cve-vulnerability-analysis-nvd-review\/810300\/\">last quarterly meeting<\/a>, held in January 2026, NIST officials acknowledged that they were fighting a \u201clost battle\u201d and indicated that they wanted to switch to a model where enrichment would be entrusted to CVE Numbering Authorities (CNAs).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CVE data enrichment: multiple sources<\/h2>\n\n\n\n<p>To enable the collection and enrichment of vulnerability-related information, an entire ecosystem has gradually been organized.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CNAs (CVE Numbering Authorities)<\/h3>\n\n\n\n<p>There are now nearly 490 organizations authorized to document CVEs, including a dozen at the \u201croot\u201d level, with full authority to issue CVE numbers.<\/p>\n\n\n\n<p>Note: since November 2025, ENISA, the European cybersecurity agency, has been recognized as a root authority. In accordance with Article 12 of the NIS2 Directive, Europe finally has its own database, called <a href=\"https:\/\/euvd.enisa.europa.eu\/\">EUVD<\/a> (European Union Vulnerability Database).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">ADPs (Authorized Data Publishers)<\/h3>\n\n\n\n<p>When a CNA publishes a CVE, it reports the existence of a vulnerability, but does not always provide the metadata essential for prioritization, such as the CVSS score or the CPE (affected product identifier). It is the role of ADPs (Authorized Data Publishers) to complete this information after the fact. Today, the US cybersecurity agency CISA is virtually the only ADP operating on a large scale.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">European and national CERTs<\/h3>\n\n\n\n<p>European and national CERTs play an essential role in qualifying and triggering alerts on the most critical vulnerabilities. However, no CERT covers the entire technological spectrum. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CERT-FR will be particularly relevant for tools that are widely used in France, such as the open-source GLPI solution, but less so for technologies such as SAP or AIX.<\/li>\n\n\n\n<li>The Belgian CERT recently issued highly responsive alerts on emerging products such as Moltbot and OpenClaw.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">The Vulnrichment open source initiative<\/h3>\n\n\n\n<p>To collectively enrich CVE data on a global scale, the open source project <a href=\"https:\/\/github.com\/cisagov\/vulnrichment\">Vulnrichment<\/a> (a contraction of Vulnerability + Enrichment) was also launched on GitHub, with around ten active contributors, including Cyberwatch.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI for automatic CVE enrichment<\/h2>\n\n\n\n<p>To conduct broad-spectrum monitoring and accelerate the identification of new CVEs, Cyberwatch leverages the complementary nature of all these public sources: NVD, CNA, ADP, CERT, open source contributions, etc.<\/p>\n\n\n\n<p>Beyond <a href=\"https:\/\/cyberwatch.fr\/en\/our-services\/threat-intelligence\/\">monitoring vulnerabilities<\/a> and their level of criticality, one of the major challenges is to associate the right CPEs with each CVE, i.e., to precisely identify the products and versions concerned. Without this information, it is impossible to detect whether a vulnerability affects a given information system.<\/p>\n\n\n\n<p>However, in 2025, a significant proportion of CVEs did not benefit from this enrichment in a timely manner, sometimes for several days, sometimes never.<\/p>\n\n\n\n<p><strong>This is where artificial intelligence comes into play.<\/strong><\/p>\n\n\n\n<p>Faced with the multiplicity of information sources on CVEs, Cyberwatch has developed an AI-powered automatic enrichment model that enables:<\/p>\n\n\n\n<p>\u00b7 Automatically identify CPEs associated with published CVEs;<\/p>\n\n\n\n<p>\u00b7 Reconcile product and vendor names with CPE nomenclatures;<\/p>\n\n\n\n<p>\u00b7 Process vulnerabilities on an hourly basis, without waiting for NVD updates.<\/p>\n\n\n\n<p>The result: <strong>of the 48,000 vulnerabilities in 2025, 13,000 were automatically enriched<\/strong>, with a relatively low false positive rate. AI does not create the data, but it makes it usable in real time, where waiting for a human update would take days or even weeks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">LLM-assisted CVE identification, prioritization, and remediation<\/h2>\n\n\n\n<p>In addition, Cyberwatch has integrated an MCP (Model Context Protocol) server into its <a href=\"https:\/\/cyberwatch.fr\/en\/our-platform\/vulnerability-manager\/\">vulnerability management<\/a> solution. This allows users to interact with our platform directly from an LLM client (Claude, Copilot, ChatGPT, etc.) using natural language.<\/p>\n\n\n\n<p>In concrete terms, users can ask questions such as <em>\u201cWhat are the latest critical vulnerabilities on my Fortinet equipment?\u201d<\/em> and obtain the following in real time:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A list of recent CVEs affecting Fortinet assets;<\/li>\n\n\n\n<li>Identification of affected machines in the fleet (e.g., 6 FortiOS assets, 3 FortiAnalyzers, 3 FortiManagers, 1 FortiWeb);<\/li>\n\n\n\n<li>The criticality level of each vulnerability;<\/li>\n\n\n\n<li>A proposed remediation plan.<\/li>\n<\/ul>\n\n\n\n<p>The advantage of this approach, compared to a search performed using an LLM that queries the web, is that Cyberwatch consults its database directly in real time and returns vulnerabilities published in the last few hours, without the risk of a delay of several weeks.<\/p>\n\n\n\n<p>It is even possible to go further with autonomous AI agents capable of summarizing new vulnerabilities on a daily basis, identifying priority actions to be taken, and executing them automatically, without human intervention. This approach could well revolutionize CVE detection, prioritization, and remediation workflows in the coming years.<\/p>\n\n\n\n<p>Want to learn more? <a href=\"https:\/\/cyberwatch.fr\/en\/contact\/\">Contact our teams<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the Cyber-IA expo, Florian Wininger, CTO and co-founder of Cyberwatch, took stock of the current situation and shared his vision of how vulnerability management will evolve in the coming years. In 2025, no fewer than 48,000 CVEs were published, an average of 130 per day. Faced with this explosion, a growing number of them [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9995,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[29],"tags":[],"class_list":["post-9994","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability management in the age of generative AI - Cyberwatch<\/title>\n<meta name=\"description\" content=\"In 2025, no fewer than 48,000 CVEs were published. AI will become essential not only for identifying, enriching, and prioritizing risks, but also for automating remediation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability management in the age of generative AI - Cyberwatch\" \/>\n<meta property=\"og:description\" content=\"In 2025, no fewer than 48,000 CVEs were published. AI will become essential not only for identifying, enriching, and prioritizing risks, but also for automating remediation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwatch\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-27T15:17:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T15:50:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1953\" \/>\n\t<meta property=\"og:image:height\" content=\"1015\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cyberwatch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cyberwatch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/\"},\"author\":{\"name\":\"cyberwatch\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a\"},\"headline\":\"Vulnerability management in the age of generative AI\",\"datePublished\":\"2026-02-27T15:17:14+00:00\",\"dateModified\":\"2026-04-13T15:50:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/\"},\"wordCount\":876,\"publisher\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png\",\"articleSection\":[\"news\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/\",\"url\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/\",\"name\":\"Vulnerability management in the age of generative AI - Cyberwatch\",\"isPartOf\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png\",\"datePublished\":\"2026-02-27T15:17:14+00:00\",\"dateModified\":\"2026-04-13T15:50:42+00:00\",\"description\":\"In 2025, no fewer than 48,000 CVEs were published. AI will become essential not only for identifying, enriching, and prioritizing risks, but also for automating remediation.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#primaryimage\",\"url\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png\",\"contentUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png\",\"width\":1953,\"height\":1015},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberwatch.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability management in the age of generative AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#website\",\"url\":\"https:\/\/cyberwatch.fr\/en\/\",\"name\":\"Cyberwatch\",\"description\":\"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.\",\"publisher\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#organization\",\"name\":\"Cyberwatch\",\"url\":\"https:\/\/cyberwatch.fr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png\",\"contentUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png\",\"width\":1883,\"height\":500,\"caption\":\"Cyberwatch\"},\"image\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a\",\"name\":\"cyberwatch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g\",\"caption\":\"cyberwatch\"},\"sameAs\":[\"https:\/\/cyberwatch.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability management in the age of generative AI - Cyberwatch","description":"In 2025, no fewer than 48,000 CVEs were published. AI will become essential not only for identifying, enriching, and prioritizing risks, but also for automating remediation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability management in the age of generative AI - Cyberwatch","og_description":"In 2025, no fewer than 48,000 CVEs were published. AI will become essential not only for identifying, enriching, and prioritizing risks, but also for automating remediation.","og_url":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/","og_site_name":"Cyberwatch","article_published_time":"2026-02-27T15:17:14+00:00","article_modified_time":"2026-04-13T15:50:42+00:00","og_image":[{"width":1953,"height":1015,"url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png","type":"image\/png"}],"author":"cyberwatch","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cyberwatch","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#article","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/"},"author":{"name":"cyberwatch","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a"},"headline":"Vulnerability management in the age of generative AI","datePublished":"2026-02-27T15:17:14+00:00","dateModified":"2026-04-13T15:50:42+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/"},"wordCount":876,"publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png","articleSection":["news"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/","url":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/","name":"Vulnerability management in the age of generative AI - Cyberwatch","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#primaryimage"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png","datePublished":"2026-02-27T15:17:14+00:00","dateModified":"2026-04-13T15:50:42+00:00","description":"In 2025, no fewer than 48,000 CVEs were published. AI will become essential not only for identifying, enriching, and prioritizing risks, but also for automating remediation.","breadcrumb":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#primaryimage","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-ai-vulnerabilities-management.png","width":1953,"height":1015},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwatch.fr\/en\/news\/vulnerability-management-in-the-age-of-generative-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwatch.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Vulnerability management in the age of generative AI"}]},{"@type":"WebSite","@id":"https:\/\/cyberwatch.fr\/en\/#website","url":"https:\/\/cyberwatch.fr\/en\/","name":"Cyberwatch","description":"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.","publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberwatch.fr\/en\/#organization","name":"Cyberwatch","url":"https:\/\/cyberwatch.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","width":1883,"height":500,"caption":"Cyberwatch"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a","name":"cyberwatch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g","caption":"cyberwatch"},"sameAs":["https:\/\/cyberwatch.fr"]}]}},"_links":{"self":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/9994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/comments?post=9994"}],"version-history":[{"count":1,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/9994\/revisions"}],"predecessor-version":[{"id":9998,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/9994\/revisions\/9998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media\/9995"}],"wp:attachment":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media?parent=9994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/categories?post=9994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/tags?post=9994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}