{"id":40765,"date":"2026-04-04T08:55:35","date_gmt":"2026-04-04T08:55:35","guid":{"rendered":"https:\/\/foreignnewstoday.com\/?p=40765"},"modified":"2026-04-04T08:55:35","modified_gmt":"2026-04-04T08:55:35","slug":"if-you-think-your-day-to-day-job-as-a-ciso-is-hard-wait-until-youre-dealing-with-a-major-breach-why-your-business-needs-cyber-insurance","status":"publish","type":"post","link":"https:\/\/foreignnewstoday.com\/?p=40765","title":{"rendered":"&#8220;If you think your day to day job as a CISO is hard, wait until you&#8217;re dealing with a major breach&#8221;: why your business needs cyber insurance"},"content":{"rendered":"<p><br \/>\n<br \/><\/p>\n<div id=\"article-body\">\n<p id=\"elk-0881e8bc-2c37-4b68-9020-d88081e765f3\">Cyber insurance is considered a no-brainer for most businesses. Yet half of all UK firms don\u2019t have any, according to the government\u2019s <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" data-url=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><u>Cyber Security Breaches survey<\/u><\/a>.<\/p>\n<p id=\"elk-b25b04f9-5ec1-4b13-aa90-ea72062d7bc2\">It seems strange when attacks such as the <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/jaguar-land-rover-u-turns-on-cyber-attack-containment-claims-admits-some-data-has-been-affected\" data-url=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/jaguar-land-rover-u-turns-on-cyber-attack-containment-claims-admits-some-data-has-been-affected\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/jaguar-land-rover-u-turns-on-cyber-attack-containment-claims-admits-some-data-has-been-affected\"><u>Jaguar Land Rover (JLR) breach<\/u><\/a> cost the <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/jaguar-land-rover-cyber-attack-financial-impact-cyber-monitoring-centre\" data-url=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/jaguar-land-rover-cyber-attack-financial-impact-cyber-monitoring-centre\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/jaguar-land-rover-cyber-attack-financial-impact-cyber-monitoring-centre\"><u>UK economy nearly \u00a32 billion<\/u><\/a>. At the time of the devastating breach, JLR reportedly <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.awin1.com\/awclick.php?awinmid=11005&amp;awinaffid=103504&amp;clickref=itpro-us-4420516978100806937&amp;p=https%3A%2F%2Fnews.sky.com%2Fstory%2Fjaguar-land-rover-was-not-insured-for-cyber-attack-journal-claims-13437655\" target=\"_blank\" data-url=\"https:\/\/news.sky.com\/story\/jaguar-land-rover-was-not-insured-for-cyber-attack-journal-claims-13437655\" referrerpolicy=\"no-referrer-when-downgrade\" rel=\"sponsored noopener\" data-hl-processed=\"hawklinks\" data-google-interstitial=\"false\" data-placeholder-url=\"https:\/\/www.awin1.com\/awclick.php?awinmid=11005&amp;awinaffid=103504&amp;clickref=hawk-custom-tracking&amp;p=https%3A%2F%2Fnews.sky.com%2Fstory%2Fjaguar-land-rover-was-not-insured-for-cyber-attack-journal-claims-13437655\" data-merchant-name=\"Sky\" data-merchant-id=\"16841\" data-merchant-network=\"AW\" data-merchant-url=\"sky.com\" data-mrf-recirculation=\"inline-link\"><u>did not have<\/u><\/a> cyber insurance, so the company had to absorb the full cost of the damage itself.<\/p>\n<p><a id=\"elk-seasonal\"\/><\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-root\"\/>\n<p id=\"elk-44a6b67c-43df-48bb-a1b9-62766031c5d7-0\">Even when firms do have cyber insurance, it doesn\u2019t always cover incidents. The <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/malware\/34381\/what-is-notpetya\" data-url=\"https:\/\/www.itpro.com\/malware\/34381\/what-is-notpetya\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/malware\/34381\/what-is-notpetya\"><u>NotPetya<\/u><\/a> destructive wiper malware attack was a cautionary tale, because insurers Zurich and Ace initially <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.fdd.org\/analysis\/2022\/11\/15\/cyber-insurance-settlements-leave-big-questions-unresolved\/\" target=\"_blank\" data-url=\"https:\/\/www.fdd.org\/analysis\/2022\/11\/15\/cyber-insurance-settlements-leave-big-questions-unresolved\/\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><u>denied covering<\/u><\/a> their clients\u2019 losses to the attack, based on a war exclusion clause. Both parties eventually <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.reinsurancene.ws\/merck-reaches-settlement-with-insurers-over-1-4bn-notpetya-cyber-attack\/\" target=\"_blank\" data-url=\"https:\/\/www.reinsurancene.ws\/merck-reaches-settlement-with-insurers-over-1-4bn-notpetya-cyber-attack\/\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><u>settled<\/u><\/a> with their insurers.<\/p>\n<p id=\"elk-a7d11434-45a4-4efa-b271-30a93719409a\">\u201cAll policies can have limits or conditions that significantly affect payouts,\u201d Daryl Flack, partner at Avella Security tells <em>ITPro.<\/em> \u201cThis can be very nuanced and will only become more so over time.\u201d<\/p>\n<p><a id=\"elk-d821375d-3643-4daa-9865-c6d737d6d87c\"\/><\/p>\n<h2 id=\"cyber-insurance-evolution-3\">Cyber insurance evolution<\/h2>\n<p id=\"elk-7ae4732c-30bc-45b0-94ea-aa3a36975b7d\">With its origins in the late 1990s, cyber insurance was originally designed to address the risk of data breaches faced by organizations handling large amounts of sensitive personal information. \u201cThese breaches could give rise to regulatory consequences and third-party claims, which were deemed suitable for coverage under a fairly traditional third-party liability policy,\u201d says Aaron Le Marquer, head of policyholder disputes at Stewarts.<\/p>\n<p id=\"elk-a4e140ec-1072-492f-9f87-fbf3d1c30a22\">Back then, the cover was narrow and viewed as \u201ca niche product for operators in particularly exposed sectors\u201d, he says.<\/p>\n<p id=\"elk-1f1f0f64-b0ba-4561-b458-31d3f539983d\">Now, things have changed drastically. Both the risks and the insurance products themselves have \u201ctransformed beyond recognition\u201d, according to Le Marquer. \u201cTechnology and data now underpins all industries, and it is hard to identify a sector that is not exposed to some form of cyber risk.\u201d<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-jXdMuyyrUfAef5DdgWC2bM\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-jXdMuyyrUfAef5DdgWC2bM slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Sign up today and you will receive a free copy of our Future Focus 2025 report &#8211; the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p id=\"elk-4aeb5771-4ce0-4fba-8642-53fcbd1530aa\">The JLR shutdown is just one example. It lasted several weeks, with each week estimated to cost around \u00a350 million, resulting in a financial impact of hundreds of millions of pounds.<\/p>\n<p id=\"elk-03164313-d6c2-4670-b25b-cdbec47fc48f\">But this is only one side of the coin, points out Boris Cipot, senior security engineer at Black Duck. \u201cThe disruption also affected thousands of suppliers, and the overall economic impact on the UK is estimated at approximately \u00a31.9\u202fbillion.\u201d<\/p>\n<p id=\"elk-40620ce4-2b5f-4d68-951d-25fd8fd4a3be\">JLR couldn\u2019t have accurately predicted the total cost, or the time it would take to recover from the attack, which ultimately required a government bailout for its <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/supply-chain-and-ai-security-in-the-spotlight-for-cyber-leaders-in-2026\" data-url=\"https:\/\/www.itpro.com\/security\/supply-chain-and-ai-security-in-the-spotlight-for-cyber-leaders-in-2026\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/supply-chain-and-ai-security-in-the-spotlight-for-cyber-leaders-in-2026\">supply chain<\/a>. Insurers are constantly adjusting policies to reflect these realities, says Flack.<\/p>\n<p id=\"elk-beba620e-1f3b-442e-ab9e-d21425d665f6\">With increasingly large premiums for cyber insurance policies, this is leading some companies to set money aside for cyber improvements and incident response, rather than buying a policy they may never use, he says.<\/p>\n<p id=\"elk-20411e87-c4df-446f-90ed-b4d66bae4e44\">However, experts warn this is a flawed strategy. Without an accurate assessment of the business impacts, it\u2019s \u201calmost impossible\u201d to know how much money to reserve, Flack says.<\/p>\n<p id=\"elk-f698fd15-4564-4374-8c0d-78f2e5a5e339\"><em>ITPro<\/em> spoke to some who said the only viable option for nearly all businesses is to purchase cyber insurance.<\/p>\n<p id=\"elk-b2ea3cee-2a8f-4a3e-b94e-90c5686264c3\">Geoff Leeming, vCISO associate at Cyberhash, has worked on incident response for insurers. \u201cI&#8217;ve seen both sides of it,\u201d he tells <em>ITPro.<\/em> \u201cTo me cyber insurance is an absolute no-brainer: if you think your day to <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/business\/business-strategy\/why-the-ciso-role-is-so-demanding-and-how-leaders-can-help\" data-url=\"https:\/\/www.itpro.com\/business\/business-strategy\/why-the-ciso-role-is-so-demanding-and-how-leaders-can-help\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/business\/business-strategy\/why-the-ciso-role-is-so-demanding-and-how-leaders-can-help\">day job as a CISO is hard<\/a>, wait until you&#8217;re dealing with a major breach. Everything becomes faster and more critical, and the pressure from management, clients, press and staff all becomes intense.\u201d<\/p>\n<p><a id=\"elk-2179d2fa-3116-41c5-a04f-1188b3510a12\"\/><\/p>\n<h2 id=\"tight-requirements-3\">Tight requirements <\/h2>\n<p id=\"elk-e6a0fc3b-919c-4a86-b400-57567af82ea3\">In recent years, cyber insurers have tightened their requirements. \u201cCompanies must now demonstrate that essential cybersecurity controls, such as <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/how-hackers-bypass-mfa-and-what-to-do-about-it\" data-url=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/how-hackers-bypass-mfa-and-what-to-do-about-it\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/how-hackers-bypass-mfa-and-what-to-do-about-it\"><u>multi factor authentication<\/u><\/a> (MFA) regular patching, reliable backups, and <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/how-businesses-can-make-cybersecurity-training-stick\" data-url=\"https:\/\/www.itpro.com\/security\/how-businesses-can-make-cybersecurity-training-stick\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/how-businesses-can-make-cybersecurity-training-stick\"><u>security awareness training<\/u><\/a> are in place before they are even eligible for a cyber insurance policy,\u201d says Cipot.<\/p>\n<p id=\"elk-1cbc14b0-820a-4116-98c8-c3e0bcae846a\">Another area that has changed significantly is cost. Cyber insurance premiums are expected to rise by <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.spglobal.com\/ratings\/en\/regulatory\/article\/241127-cyber-insurance-market-outlook-2025-cycle-management-will-be-key-to-sustaining-profits-s13323968\" target=\"_blank\" data-url=\"https:\/\/www.spglobal.com\/ratings\/en\/regulatory\/article\/241127-cyber-insurance-market-outlook-2025-cycle-management-will-be-key-to-sustaining-profits-s13323968\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><u>up to 20%<\/u><\/a> in 2026, driven by the increasing frequency and severity of cyberattacks, says Cipot. \u201cInsurers have also become more aware of supply chain dependencies. As a result, assessing the potential impact of supply chain disruptions on the insured company is now a key part of the screening process.\u201d<\/p>\n<p id=\"elk-cf0190a4-4507-481a-9326-1fa6e8f466c1\">Coverage is now available for regulatory risk and third-party claims, as well as for costs of <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/simulating-attacks-how-to-use-tabletop-exercises-incident-response\" data-url=\"https:\/\/www.itpro.com\/security\/simulating-attacks-how-to-use-tabletop-exercises-incident-response\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/simulating-attacks-how-to-use-tabletop-exercises-incident-response\"><u>responding to<\/u><\/a> and shutting down an attack, says Le Marquer. It also often covers rebuilding systems following an attack, extortion and ransomware payments and business interruption loss, he explains.<\/p>\n<p id=\"elk-2b7d6780-0522-45cc-9562-e3de98eb5c2b\">But as with any insurance policy, there are important limitations to be aware of, Cipot adds. \u201cIncidents resulting from <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/ddos-attackers-are-pouncing-on-unpatched-vulnerabilities\" data-url=\"https:\/\/www.itpro.com\/security\/ddos-attackers-are-pouncing-on-unpatched-vulnerabilities\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/ddos-attackers-are-pouncing-on-unpatched-vulnerabilities\">unpatched vulnerabilities<\/a> or <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/has-password-hygiene-ever-improved\" data-url=\"https:\/\/www.itpro.com\/security\/has-password-hygiene-ever-improved\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/has-password-hygiene-ever-improved\">poor security hygiene<\/a> may not be covered, which is generally understandable from an insurer\u2019s perspective. Many policies also include exclusions for cyber attacks linked to war, terrorism, or <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/cloudflare-warns-state-backed-hackers-are-weaponizing-legitimate-enterprise-ecosystems-as-living-off-the-land-attacks-surge\" data-url=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/cloudflare-warns-state-backed-hackers-are-weaponizing-legitimate-enterprise-ecosystems-as-living-off-the-land-attacks-surge\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/cloudflare-warns-state-backed-hackers-are-weaponizing-legitimate-enterprise-ecosystems-as-living-off-the-land-attacks-surge\">state-backed actors<\/a>, as these events can be too large for insurers to absorb.\u201d<\/p>\n<p id=\"elk-208bade3-6314-4cd3-9fd9-ee294326ba83\">Physical damage, bodily injury, and certain types of regulatory fines may also fall outside the scope of coverage. In addition, insurers may exclude coverage for <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/strategy\/28181\/what-is-ai\" data-url=\"https:\/\/www.itpro.com\/strategy\/28181\/what-is-ai\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/strategy\/28181\/what-is-ai\"><u>artificial intelligence<\/u><\/a> (AI) related failures or large, <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/organizations-hit-by-90-zero-day-vulnerabilities-last-year\" data-url=\"https:\/\/www.itpro.com\/security\/organizations-hit-by-90-zero-day-vulnerabilities-last-year\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/organizations-hit-by-90-zero-day-vulnerabilities-last-year\"><u>zero day vulnerabilities<\/u><\/a>, as these risks are particularly difficult to predict and model, Cipot explains.<\/p>\n<p><a id=\"elk-62a79470-bfaa-4343-b2ca-13622e7e0407\"\/><\/p>\n<h2 id=\"selecting-a-policy-3\">Selecting a policy<\/h2>\n<p id=\"elk-ce441fbf-4bf2-462f-8adf-97874eb280e5\">If selecting a policy seems overwhelming, there are also cyber insurance brokers that can help. To ensure you get the best deal for your business, working with the right broker is \u201ccrucial\u201d, advises Daniel Woods, a lecturer in cybersecurity at the University of Edinburgh. \u201cOnly specialist cyber brokers understand the nuances of coverage, which is not yet standardized due to all of the innovation. In particular, they can explain what losses look like for a particular industry or revenue band. The real danger is relying on a generalist broker who may place a policy with a heavy sublimit or exclusion.\u201d<\/p>\n<p id=\"elk-69cc1f6c-3428-4b57-be62-1575e5aa2a22\">Good cyber insurers cover your costs and also come with a panel of vetted specialists with pre-agreed rates, says Leeming. \u201cAnd you know that the insurer has exactly the same motivation as you: to get this sorted as quickly and cost-effectively as possible, because they&#8217;re paying the bill and the longer your outage drags on, the more they pay.\u201d<\/p>\n<p id=\"elk-cbc92022-dd7a-44e2-a9d3-17f762f7656d\">Paying attention to the insurer&#8217;s proposal form can also help firms to boost security, says Leeming. \u201cFirstly, they&#8217;ve analysed the thousands of cases they&#8217;ve paid out on, and they&#8217;re asking about the things that they know will save them money by preventing you having a breach. Forget <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.iso.org\/home.html\" target=\"_blank\" data-url=\"https:\/\/www.iso.org\/home.html\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><u>ISO<\/u><\/a> or <a data-analytics-id=\"inline-link\" href=\"https:\/\/soc2.co.uk\/\" target=\"_blank\" data-url=\"https:\/\/soc2.co.uk\/\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><u>SOC2<\/u><\/a>, a good cyber insurer&#8217;s proposal form is the most practical list of how to secure your firm.\u201d<\/p>\n<p id=\"elk-98864a14-eb7d-42dd-962a-f20af2e9920b\">Don&#8217;t ever lie on the form, he warns. \u201cTell the whole truth. If you try to make yourself look good on the proposal form, you risk ending up in the worst of both worlds where you&#8217;ve paid the premium, thought you were covered, and find out at the worst possible time that the insurance isn&#8217;t valid.\u201d<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.itpro.com\/security\/why-your-business-needs-cyber-insurance\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber insurance is considered a no-brainer for most businesses. Yet half of all UK firms don\u2019t have any, according to the government\u2019s Cyber Security Breaches survey.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":40766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[32],"tags":[],"class_list":["post-40765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/posts\/40765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=40765"}],"version-history":[{"count":0,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/posts\/40765\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/media\/40766"}],"wp:attachment":[{"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=40765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=40765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=40765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}