{"id":11220,"date":"2026-01-26T07:47:09","date_gmt":"2026-01-26T12:47:09","guid":{"rendered":"https:\/\/cycode.com\/?p=11220"},"modified":"2026-01-26T07:47:09","modified_gmt":"2026-01-26T12:47:09","slug":"uniting-code-and-runtime-cycode-and-bright-security","status":"publish","type":"post","link":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/","title":{"rendered":"Uniting Code and Runtime: Cycode and Bright Security Partner to Deliver Complete Application Security Coverage"},"content":{"rendered":"<p><span>Modern software security requires more than isolated point tools &#8211; the tools you have in place need to be interoperable and drive unique value. Vulnerabilities discovered in production often trace back to code-level issues left unresolved during development, and the lack of visibility between the two creates dangerous blind spots.<\/span><\/p>\n<p><span>That\u2019s why <\/span><b>Cycode<\/b><span> and <\/span><b>Bright Security<\/b><span> have partnered to integrate Bright\u2019s dynamic application security testing (DAST) with Cycode\u2019s <\/span><b>Application Security Posture Management (ASPM)<\/b><span> platform. Together, they deliver continuous visibility and faster remediation by connecting runtime findings to their source code origins.<\/span><\/p>\n<h3><b>From Discovery to Remediation: Without the Gaps<\/b><\/h3>\n<p><span>Bright\u2019s DAST engine continuously scans live applications and APIs to identify real, exploitable vulnerabilities in running environments. Cycode ingests these findings directly, correlating them with SDLC assets such as repositories, branches, commits, and code owners.<\/span><\/p>\n<p><span>The result: full <\/span><b>exposure path mapping<\/b><span> from vulnerability \u2192 endpoint \u2192 repository \u2192 developer.<\/span><\/p>\n<p><span>This combined workflow allows teams to:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Trace DAST findings back to source code<\/b><span> and automatically assign remediation to the right owner or team.<\/span><span>\n<p><\/span><\/li>\n<li aria-level=\"1\"><b>Enrich runtime insights<\/b><span> with commit metadata, environment details, and build context from CI\/CD pipelines.<\/span><span>\n<p><\/span><\/li>\n<li aria-level=\"1\"><b>Automate remediation workflows<\/b><span> by pushing correlated issues into Jira, GitHub, GitLab, or IDE plug-ins.<\/span><span>\n<p><\/span><\/li>\n<li aria-level=\"1\"><b>Validate fixes<\/b><span> through Bright\u2019s retesting API, closing the loop between code and runtime.<\/span><span>\n<p><\/span><\/li>\n<\/ul>\n<p><span>By unifying detection and remediation, Cycode and Bright ensure that vulnerabilities are not just found, but they\u2019re fixed.<\/span><\/p>\n<h3><b>Why Cycode and Bright Are a Natural Fit<\/b><\/h3>\n<p><span>The partnership builds on deep technical synergies between the two platforms:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Capability<\/b><\/td>\n<td><b>Bright Security<\/b><\/td>\n<td><b>Cycode<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Testing Scope<\/b><\/td>\n<td><span>Dynamic runtime scanning (DAST, API, web app)<\/span><\/td>\n<td><span>Code, IaC, secrets, dependencies (SAST\/SCA\/IaC)<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Insight Layer<\/b><\/td>\n<td><span>Exploitability and runtime context<\/span><\/td>\n<td><span>Source code mapping, ownership, and SDLC posture<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Remediation<\/b><\/td>\n<td><span>Validation and re-testing<\/span><\/td>\n<td><span>Automated assignment, ticketing, and policy orchestration<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span>Joint customers can now bridge the gap between runtime discovery and code-level response \u2014 eliminating siloed AppSec data and manual triage.<\/span><\/p>\n<h3><b>Use Case in Action: Closing the Loop on Runtime Findings<\/b><\/h3>\n<p><span>Consider a SQL injection vulnerability detected by Bright\u2019s scanner in a staging environment. Previously, triaging such a finding might have taken days as security teams manually traced the issue back to a developer or repo.<\/span><\/p>\n<p><span>With Cycode\u2019s integration, the finding is instantly enriched:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><span>Cycode maps the vulnerable endpoint to its originating repository and commit.<\/span><span>\n<p><\/span><\/li>\n<li aria-level=\"1\"><span>The platform identifies the responsible code owner.<\/span><span>\n<p><\/span><\/li>\n<li aria-level=\"1\"><span>A Jira issue is automatically created and linked to the relevant pull request.<\/span><span>\n<p><\/span><\/li>\n<li aria-level=\"1\"><span>Once remediated, Bright revalidates the fix via API.<\/span><span>\n<p><\/span><\/li>\n<\/ul>\n<p><span>This closed-loop workflow reduces remediation time from days to hours and eliminates the back-and-forth that typically slows down AppSec teams.<\/span><\/p>\n<h3><b>Customer Spotlight: Benevity<\/b><\/h3>\n<p><i><span>&#8220;&#8230;As organizations look to shift security earlier in the development cycle, Bright&#8217;s testing capabilities paired with Cycode&#8217;s end-to-end visibility represent a major step forward. Together, we see a future where developers get guided, actionable security insights before code ever reaches production helping teams reduce risk without slowing innovation&#8230;&#8221;<\/span><\/i><\/p>\n<p><i><span>~ Rick Backley, Manager, App Sec and Product Security, Benevity<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<h3><b>The Impact: Unified Context, Measurable Results<\/b><\/h3>\n<p><span>Organizations adopting the Cycode\u2013Bright integration gain:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Consolidated visibility<\/b><span> across all AppSec scanners and assets.<\/span><span>\n<p><\/span><\/li>\n<li aria-level=\"1\"><b>Data-driven prioritization<\/b><span> using exploitability and code exposure together.<\/span><span>\n<p><\/span><\/li>\n<li aria-level=\"1\"><b>Reduced MTTR<\/b><span> by routing issues directly to the developer who owns the code.<\/span><span>\n<p><\/span><\/li>\n<li aria-level=\"1\"><b>Improved posture tracking<\/b><span> through Cycode\u2019s Risk Intelligence Graph and SDLC mapping.<\/span><span>\n<p><\/span><\/li>\n<\/ul>\n<p><span>This partnership transforms DAST from a reactive testing tool into an actionable component of a continuous security program.<\/span><\/p>\n<h3><b>Get Started<\/b><\/h3>\n<p><span>The Cycode\u2013Bright Security integration is now available for joint customers. To learn more, <\/span><a href=\"https:\/\/cycode.com\/demo\/\"><span>request a demo<\/span><\/a><span> or contact your Cycode or Bright Security representative.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modern software security requires more than isolated point tools &#8211; the tools you have in place need to be interoperable and drive unique value&#8230;<\/p>\n","protected":false},"author":53,"featured_media":11221,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[13],"tags":[],"class_list":["post-11220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Uniting Code and Runtime: Security for Applications | Cycode<\/title>\n<meta name=\"description\" content=\"Cycode and Bright Security partner to connect runtime vulnerabilities with source code origins for continuous visibility and faster, automated remediation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Uniting Code and Runtime: Cycode and Bright Security Partner to Deliver Complete Application Security Coverage - Cycode\" \/>\n<meta property=\"og:description\" content=\"Cycode and Bright Security partner to connect runtime vulnerabilities with source code origins for continuous visibility and faster, automated remediation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cycode\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cycodesec\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-26T12:47:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cycode.com\/wp-content\/uploads\/2026\/01\/Blog-Cycode_Bright_Option2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1358\" \/>\n\t<meta property=\"og:image:height\" content=\"740\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Prasad Raman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CycodeHQ\" \/>\n<meta name=\"twitter:site\" content=\"@CycodeHQ\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prasad Raman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/\"},\"author\":{\"name\":\"Prasad Raman\",\"@id\":\"https:\\\/\\\/cycode.com\\\/#\\\/schema\\\/person\\\/993b71ce5efc1814cf031d2fb2c2a03f\"},\"headline\":\"Uniting Code and Runtime: Cycode and Bright Security Partner to Deliver Complete Application Security Coverage\",\"datePublished\":\"2026-01-26T12:47:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/\"},\"wordCount\":606,\"publisher\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cycode.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Blog-Cycode_Bright_Option2.png\",\"articleSection\":[\"BLOG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/\",\"url\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/\",\"name\":\"Uniting Code and Runtime: Security for Applications | Cycode\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cycode.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Blog-Cycode_Bright_Option2.png\",\"datePublished\":\"2026-01-26T12:47:09+00:00\",\"description\":\"Cycode and Bright Security partner to connect runtime vulnerabilities with source code origins for continuous visibility and faster, automated remediation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cycode.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Blog-Cycode_Bright_Option2.png\",\"contentUrl\":\"https:\\\/\\\/cycode.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Blog-Cycode_Bright_Option2.png\",\"width\":1358,\"height\":740},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cycode.com\\\/blog\\\/uniting-code-and-runtime-cycode-and-bright-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cycode.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uniting Code and Runtime: Cycode and Bright Security Partner to Deliver Complete Application Security Coverage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cycode.com\\\/#website\",\"url\":\"https:\\\/\\\/cycode.com\\\/\",\"name\":\"Cycode\",\"description\":\"Complete Software Supply Chain Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cycode.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cycode.com\\\/#organization\",\"name\":\"Cycode\",\"url\":\"https:\\\/\\\/cycode.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cycode.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cycode.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/fav2.png\",\"contentUrl\":\"https:\\\/\\\/cycode.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/fav2.png\",\"width\":28,\"height\":29,\"caption\":\"Cycode\"},\"image\":{\"@id\":\"https:\\\/\\\/cycode.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cycodesec\",\"https:\\\/\\\/x.com\\\/CycodeHQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cycode\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cycode.com\\\/#\\\/schema\\\/person\\\/993b71ce5efc1814cf031d2fb2c2a03f\",\"name\":\"Prasad Raman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cycode.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/image-3-96x96.png\",\"url\":\"https:\\\/\\\/cycode.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/image-3-96x96.png\",\"contentUrl\":\"https:\\\/\\\/cycode.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/image-3-96x96.png\",\"caption\":\"Prasad Raman\"},\"description\":\"Head of Strategic Alliances\",\"url\":\"https:\\\/\\\/cycode.com\\\/blog\\\/author\\\/prasadcycode\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Uniting Code and Runtime: Security for Applications | Cycode","description":"Cycode and Bright Security partner to connect runtime vulnerabilities with source code origins for continuous visibility and faster, automated remediation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/","og_locale":"en_US","og_type":"article","og_title":"Uniting Code and Runtime: Cycode and Bright Security Partner to Deliver Complete Application Security Coverage - Cycode","og_description":"Cycode and Bright Security partner to connect runtime vulnerabilities with source code origins for continuous visibility and faster, automated remediation.","og_url":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/","og_site_name":"Cycode","article_publisher":"https:\/\/www.facebook.com\/cycodesec","article_published_time":"2026-01-26T12:47:09+00:00","og_image":[{"width":1358,"height":740,"url":"https:\/\/cycode.com\/wp-content\/uploads\/2026\/01\/Blog-Cycode_Bright_Option2.png","type":"image\/png"}],"author":"Prasad Raman","twitter_card":"summary_large_image","twitter_creator":"@CycodeHQ","twitter_site":"@CycodeHQ","twitter_misc":{"Written by":"Prasad Raman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/#article","isPartOf":{"@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/"},"author":{"name":"Prasad Raman","@id":"https:\/\/cycode.com\/#\/schema\/person\/993b71ce5efc1814cf031d2fb2c2a03f"},"headline":"Uniting Code and Runtime: Cycode and Bright Security Partner to Deliver Complete Application Security Coverage","datePublished":"2026-01-26T12:47:09+00:00","mainEntityOfPage":{"@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/"},"wordCount":606,"publisher":{"@id":"https:\/\/cycode.com\/#organization"},"image":{"@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/#primaryimage"},"thumbnailUrl":"https:\/\/cycode.com\/wp-content\/uploads\/2026\/01\/Blog-Cycode_Bright_Option2.png","articleSection":["BLOG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/","url":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/","name":"Uniting Code and Runtime: Security for Applications | Cycode","isPartOf":{"@id":"https:\/\/cycode.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/#primaryimage"},"image":{"@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/#primaryimage"},"thumbnailUrl":"https:\/\/cycode.com\/wp-content\/uploads\/2026\/01\/Blog-Cycode_Bright_Option2.png","datePublished":"2026-01-26T12:47:09+00:00","description":"Cycode and Bright Security partner to connect runtime vulnerabilities with source code origins for continuous visibility and faster, automated remediation.","breadcrumb":{"@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/#primaryimage","url":"https:\/\/cycode.com\/wp-content\/uploads\/2026\/01\/Blog-Cycode_Bright_Option2.png","contentUrl":"https:\/\/cycode.com\/wp-content\/uploads\/2026\/01\/Blog-Cycode_Bright_Option2.png","width":1358,"height":740},{"@type":"BreadcrumbList","@id":"https:\/\/cycode.com\/blog\/uniting-code-and-runtime-cycode-and-bright-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cycode.com\/"},{"@type":"ListItem","position":2,"name":"Uniting Code and Runtime: Cycode and Bright Security Partner to Deliver Complete Application Security Coverage"}]},{"@type":"WebSite","@id":"https:\/\/cycode.com\/#website","url":"https:\/\/cycode.com\/","name":"Cycode","description":"Complete Software Supply Chain Security","publisher":{"@id":"https:\/\/cycode.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cycode.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cycode.com\/#organization","name":"Cycode","url":"https:\/\/cycode.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cycode.com\/#\/schema\/logo\/image\/","url":"https:\/\/cycode.com\/wp-content\/uploads\/2025\/11\/fav2.png","contentUrl":"https:\/\/cycode.com\/wp-content\/uploads\/2025\/11\/fav2.png","width":28,"height":29,"caption":"Cycode"},"image":{"@id":"https:\/\/cycode.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cycodesec","https:\/\/x.com\/CycodeHQ","https:\/\/www.linkedin.com\/company\/cycode\/"]},{"@type":"Person","@id":"https:\/\/cycode.com\/#\/schema\/person\/993b71ce5efc1814cf031d2fb2c2a03f","name":"Prasad Raman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cycode.com\/wp-content\/uploads\/2024\/04\/image-3-96x96.png","url":"https:\/\/cycode.com\/wp-content\/uploads\/2024\/04\/image-3-96x96.png","contentUrl":"https:\/\/cycode.com\/wp-content\/uploads\/2024\/04\/image-3-96x96.png","caption":"Prasad Raman"},"description":"Head of Strategic Alliances","url":"https:\/\/cycode.com\/blog\/author\/prasadcycode\/"}]}},"_links":{"self":[{"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/posts\/11220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/comments?post=11220"}],"version-history":[{"count":0,"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/posts\/11220\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/media\/11221"}],"wp:attachment":[{"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/media?parent=11220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/categories?post=11220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cycode.com\/wp-json\/wp\/v2\/tags?post=11220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}