{"id":37774,"date":"2023-07-27T13:31:54","date_gmt":"2023-07-27T13:31:54","guid":{"rendered":"https:\/\/www.i-exceed.com\/?post_type=blog&#038;p=37774"},"modified":"2025-07-18T07:14:06","modified_gmt":"2025-07-18T07:14:06","slug":"fraud-prevention-in-banks","status":"publish","type":"blog","link":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/","title":{"rendered":"Enhancing Banking Fraud Prevention from the Ground Up"},"content":{"rendered":"<p>The correlation between the adoption of digital banking and the associated threats is clear: as adoption rates rise, so do the infosec risks. To ensure the success and credibility of digital banking, minimizing these risks becomes paramount.<\/p>\n<p>In this article, we will delve into several measures that banks can employ to bolster their fraud prevention efforts right from the development stage of a solution and we will emphasize the importance of adopting a multi-layered defence strategy.<\/p>\n<p><em>&#8220;An in-depth defence approach is essential for ensuring fraud prevention across the entire digital banking system&#8221; &#8211; Sriram Kumar, Sr. VP, Cloud, Architecture, &amp; Performance Management<\/em><\/p>\n<p>Some industry standard practices adopted for fraud prevention in the development stage are:<\/p>\n<ul>\n<li>DevSecOps \u2013 Application security focus from the start (Shift Left)<\/li>\n<li>Comprehensive static and dynamic code analysers in the pipeline<\/li>\n<li>Comprehensive software composition analysis (SCA)<\/li>\n<li>Threat modelling techniques in development stages<\/li>\n<li>Application layer encryption in addition to TLS<\/li>\n<li>Embedding data privacy controls in development stages<\/li>\n<li>Implementing defence-in-depth from the initial stage to deployment<\/li>\n<li>Integrating comprehensive threat detection and analysis solution (SIEM)<\/li>\n<li>Periodic third-party vulnerability assessment and penetration testing<\/li>\n<li>Harnessing AI\/ML for fraud detection<\/li>\n<\/ul>\n<p>Let us look at each of the above listed practices in detail.<\/p>\n<h2>DevSecOps \u2013 Application Security Focus from the Start (Shift Left)<\/h2>\n<p>Practicing &#8220;Shift Left&#8221; involves integrating security practices and considerations early in the software development lifecycle, starting from the initial stages of design and development. The advantages of this approach include:<\/p>\n<ul>\n<li>Early detection of vulnerabilities: Addressing security requirements proactively enables the early detection of vulnerabilities that reduces security risk and associated costs.<\/li>\n<li>Enhanced overall security: By implementing best practices and secure coding techniques from the outset, overall security of the software is substantially enhanced.<\/li>\n<li>Facilitating collaboration: Involving developers, security teams, and stakeholders from the initial stages ensures seamless integration of security considerations throughout the development lifecycle.<\/li>\n<\/ul>\n<h2>Comprehensive Static and Dynamic Code Analysers in the Pipeline<\/h2>\n<p>Incorporating tools that analyse software code from the start of the project for potential vulnerabilities and adherence to coding standards is indispensable when it comes to application development. While static code analysis involves scrutinizing the code without executing it, dynamic code analysis analyses code during runtime. The advantages of this approach include:<\/p>\n<ul>\n<li>Early detection of threats: Vulnerabilities in the codebase, including OWASP top 10 vulnerabilities.<\/li>\n<li>Improved code quality: Code analysers ensure better readability, maintainability and overall quality that effectively reduces technical debt and accelerates time to market.<\/li>\n<\/ul>\n<h2>Comprehensive software composition analysis (SCA)<\/h2>\n<p>While open-source libraries offer flexibility and efficiency, there are inherent risks in using a library such as:<\/p>\n<ul>\n<li>Library has published vulnerabilities.<\/li>\n<li>Library is not maintained for many years.<\/li>\n<li>Library has incompatible open-source license that prevents commercial use.<\/li>\n<\/ul>\n<p>Conducting periodic reviews of available libraries as a part of the build pipeline and ensuring their compliance is critical so that any security vulnerability coming from a third party library is identified and fixed early in the lifecycle.<\/p>\n<h2>Threat Modelling Techniques during Development stages<\/h2>\n<p>During the development processes, adopting an industry standard threat modelling technique like Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service (DoS), and Elevation of Privilege (STRIDE) helps in visualizing various threats and ensuring that threats are negated with right logical controls in design and development.<\/p>\n<h2>Application Layer Encryption in Addition to TLS<\/h2>\n<p>While Transport Layer Security (TLS) takes care of encryption, authentication, and data integrity at the transport layer, banks can further augment security by implementing application layer encryption. This involves encrypting sensitive data within the payload itself that provides an additional layer of safeguarding. Consequently, even in the event of a breach at lower layers, the data remains protected, ensuring confidentiality and integrity during transmission. The advantages of employing application layer encryption include:<\/p>\n<ul>\n<li>Enhanced Data Protection: Encrypting sensitive data within the payload at the application layer ensures the confidentiality and integrity of the transmitted data, making it much harder for unauthorized parties to decipher the information.<\/li>\n<li>Defence against Multi-Layer Attacks: The combination of TLS and application layer encryption creates a multi-layered defence system that makes it harder for cybercriminals to exploit vulnerabilities.<\/li>\n<li>Protection against Insider Threats: Application layer encryption prevents unauthorized employees or individuals within an organization to access sensitive information. Even if an insider gains access to the communication flow, the encryption at the application layer ensures the data remains unintelligible to them.<\/li>\n<li>Customizable Encryption: Application layer encryption allows for more granular control over what data to encrypt. This ensures performance optimization and efficiency.<\/li>\n<li>Complementing TLS Limitations: While TLS is good, it\u2019s not without limitation when facing expert fraudsters. Application layer encryption serves as an additional security measure that complements TLS, reinforcing the overall security of the communication channel.<\/li>\n<\/ul>\n<h2>Embedding Data Privacy Controls in Development Stages<\/h2>\n<p>Embedding data privacy controls during the initial stages would help in handling sensitive data. Various techniques like tokenization or anonymization or industry standard encryption of the specific data elements Ensuring coverage of the sensitive data through a comprehensive data flow diagram would help harness the controls.<\/p>\n<h2>Implementing Defence-in-Depth from the Initial Stage to Deployment<\/h2>\n<p>The concept of defence-in-depth entails a comprehensive and layered security approach that starts right from the foundation when building a solution. This includes integrating multiple security controls at various levels such as network, host, application, and data, to mitigate and shield against potential risks. The merits of this approach encompass:<\/p>\n<ul>\n<li>Enhanced protection and resilience against attacks: Even if one layer is compromised, the remaining layers continue to provide defence, diminishing the chances of a successful breach.<\/li>\n<li>Adaptability: The incorporation of an array of security measures facilitates the handling of diverse threats and the ability to adapt to evolving attack techniques. Some of these security measures revolve around principles of least privilege, separation of duties, and auditability.<\/li>\n<li>Defence against internal threats: By implementing controls that restrict access privileges and monitor user activities, banks can guard against internal threats.<\/li>\n<li>Compliance and regulatory adherence: Thorough security measures ensure compliance with industry standards and regulations.<\/li>\n<li>Comprehensive event logging of security events.<\/li>\n<\/ul>\n<h2>Integrating Comprehensive Threat Detection and Analysis solution (SIEM)<\/h2>\n<p>Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events from various tiers including application layer, as well as a wide variety of infrastructure layers and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyse log events and other data across disparate sources, and operational capabilities.<\/p>\n<p>Collected logs and registered events across various layers can be applied through a set of rules to visualize an adversary tactic or technique such as MITRE ATT&amp;CK.<\/p>\n<h2>Periodic Third-Party Vulnerability Assessment and Penetration Testing<\/h2>\n<p>The most important assurance practice is to involve reputed third parties to periodically conduct a compressive vulnerability and penetration test to cover new application features or infrastructure rollouts to ensure that that there are no unnoticed gaps or vulnerabilities.<\/p>\n<p>It is recommended that third parties are often rotated to ensure that what could be missed by one vendors toolset\/practice is covered by another vendor.<\/p>\n<h2>Harnessing AI\/ML for Fraud Detection<\/h2>\n<p>AI\/ML-based anomaly detection systems possess the capability to analyse vast amounts of data in real-time that enables banks to swiftly identify anomalies and detect fraudulent activities. Embracing such technology significantly boosts fraud prevention capabilities and keeps banks ahead of cybercriminals. The advantages of employing AI\/ML in fraud detection are:<\/p>\n<ul>\n<li>Real-time anomaly detection: AI\/ML-based systems can analyse vast amounts of data in real-time that swiftly identifies anomalies and detects fraudulent activities.<\/li>\n<li>Enhanced accuracy: AI\/ML algorithms continuously learn from data that lead to improved accuracy in identifying fraudulent patterns and reducing false positives.<\/li>\n<li>Adaptive and evolving: AI\/ML systems can adapt to evolving fraud techniques, staying one step ahead of cybercriminals.<\/li>\n<li>Automated decision-making: By automating fraud detection, banks can save time and resources while responding quickly to potential threats.<\/li>\n<li>Comprehensive analysis: AI\/ML can analyse complex data patterns, including non-linear relationships, providing a more comprehensive view of risks.<\/li>\n<li>Reducing manual intervention: AI\/ML reduces the need for manual review, streamlining processes and optimizing fraud prevention efforts.<\/li>\n<li>Personalized fraud detection: AI\/ML can tailor fraud detection based on individual user behaviour, enhancing the accuracy of identifying suspicious activities.<\/li>\n<li>Scalability: AI\/ML solutions can manage large-scale data and transaction volumes efficiently, making them suitable for growing banking operations.<\/li>\n<\/ul>\n<h2>In Conclusion<\/h2>\n<p>To fortify themselves against the escalating threat of fraud, banks need to embrace a holistic approach. This involves implementing defence-in-depth strategies, integrating security right from the initial stages of development, harnessing innovative technologies, and fostering customer awareness.<\/p>\n<p>Building trust and confidence in financial systems is paramount to ensure a secure digital banking experience. It is important to note that fraud prevention is an ongoing journey, necessitating constant adaptation to emerging threats. To implement resilient security measures in your digital initiatives, feel free to reach out to us at marketing@i-exceed.com for further details.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The correlation between the adoption of digital banking and the associated threats is clear: as adoption rates rise, so do<\/p>\n","protected":false},"author":14,"featured_media":37775,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[156],"class_list":["post-37774","blog","type-blog","status-publish","format-standard","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>US Bank Fraud Prevention from the Ground Up | i-exceed<\/title>\n<meta name=\"description\" content=\"Building a strong multi-layered defense starting with code analysis is key to preventing fraud and securing modern banking systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"US Bank Fraud Prevention from the Ground Up | i-exceed\" \/>\n<meta property=\"og:description\" content=\"Building a strong multi-layered defense starting with code analysis is key to preventing fraud and securing modern banking systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/\" \/>\n<meta property=\"og:site_name\" content=\"i-exceed technology solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/iexceedltd\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-18T07:14:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2023\/07\/Fraud-Prevention-Main-Banner-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"421\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Sree Parvathy\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/\",\"url\":\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/\",\"name\":\"US Bank Fraud Prevention from the Ground Up | i-exceed\",\"isPartOf\":{\"@id\":\"https:\/\/www.i-exceed.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2023\/07\/Fraud-Prevention-Main-Banner-3.jpg\",\"datePublished\":\"2023-07-27T13:31:54+00:00\",\"dateModified\":\"2025-07-18T07:14:06+00:00\",\"description\":\"Building a strong multi-layered defense starting with code analysis is key to preventing fraud and securing modern banking systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#primaryimage\",\"url\":\"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2023\/07\/Fraud-Prevention-Main-Banner-3.jpg\",\"contentUrl\":\"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2023\/07\/Fraud-Prevention-Main-Banner-3.jpg\",\"width\":750,\"height\":421,\"caption\":\"fraud prevention in banks - i-exceed\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.i-exceed.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing Banking Fraud Prevention from the Ground Up\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.i-exceed.com\/us\/#website\",\"url\":\"https:\/\/www.i-exceed.com\/us\/\",\"name\":\"i-exceed technology solutions\",\"description\":\"Powering Digital Banking Transformation for New Age Banks\",\"publisher\":{\"@id\":\"https:\/\/www.i-exceed.com\/us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.i-exceed.com\/us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.i-exceed.com\/us\/#organization\",\"name\":\"Powering Smart Banks\",\"url\":\"https:\/\/www.i-exceed.com\/us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.i-exceed.com\/us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2020\/09\/i-exceed-logo-light.png\",\"contentUrl\":\"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2020\/09\/i-exceed-logo-light.png\",\"width\":160,\"height\":84,\"caption\":\"Powering Smart Banks\"},\"image\":{\"@id\":\"https:\/\/www.i-exceed.com\/us\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/iexceedltd\",\"https:\/\/www.instagram.com\/iexceedltd\",\"https:\/\/in.linkedin.com\/company\/i-exceed-technology-solutions-private-limited\",\"https:\/\/www.youtube.com\/channel\/UCpn01a72qXPT7c5S8CGAc7g\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"US Bank Fraud Prevention from the Ground Up | i-exceed","description":"Building a strong multi-layered defense starting with code analysis is key to preventing fraud and securing modern banking systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/","og_locale":"en_US","og_type":"article","og_title":"US Bank Fraud Prevention from the Ground Up | i-exceed","og_description":"Building a strong multi-layered defense starting with code analysis is key to preventing fraud and securing modern banking systems.","og_url":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/","og_site_name":"i-exceed technology solutions","article_publisher":"https:\/\/facebook.com\/iexceedltd","article_modified_time":"2025-07-18T07:14:06+00:00","og_image":[{"width":750,"height":421,"url":"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2023\/07\/Fraud-Prevention-Main-Banner-3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes","Written by":"Sree Parvathy"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/","url":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/","name":"US Bank Fraud Prevention from the Ground Up | i-exceed","isPartOf":{"@id":"https:\/\/www.i-exceed.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#primaryimage"},"image":{"@id":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2023\/07\/Fraud-Prevention-Main-Banner-3.jpg","datePublished":"2023-07-27T13:31:54+00:00","dateModified":"2025-07-18T07:14:06+00:00","description":"Building a strong multi-layered defense starting with code analysis is key to preventing fraud and securing modern banking systems.","breadcrumb":{"@id":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#primaryimage","url":"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2023\/07\/Fraud-Prevention-Main-Banner-3.jpg","contentUrl":"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2023\/07\/Fraud-Prevention-Main-Banner-3.jpg","width":750,"height":421,"caption":"fraud prevention in banks - i-exceed"},{"@type":"BreadcrumbList","@id":"https:\/\/www.i-exceed.com\/us\/blog\/fraud-prevention-in-banks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.i-exceed.com\/us\/"},{"@type":"ListItem","position":2,"name":"Enhancing Banking Fraud Prevention from the Ground Up"}]},{"@type":"WebSite","@id":"https:\/\/www.i-exceed.com\/us\/#website","url":"https:\/\/www.i-exceed.com\/us\/","name":"i-exceed technology solutions","description":"Powering Digital Banking Transformation for New Age Banks","publisher":{"@id":"https:\/\/www.i-exceed.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.i-exceed.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.i-exceed.com\/us\/#organization","name":"Powering Smart Banks","url":"https:\/\/www.i-exceed.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.i-exceed.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2020\/09\/i-exceed-logo-light.png","contentUrl":"https:\/\/www.i-exceed.com\/us\/wp-content\/uploads\/2020\/09\/i-exceed-logo-light.png","width":160,"height":84,"caption":"Powering Smart Banks"},"image":{"@id":"https:\/\/www.i-exceed.com\/us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/iexceedltd","https:\/\/www.instagram.com\/iexceedltd","https:\/\/in.linkedin.com\/company\/i-exceed-technology-solutions-private-limited","https:\/\/www.youtube.com\/channel\/UCpn01a72qXPT7c5S8CGAc7g"]}]}},"_links":{"self":[{"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/blog\/37774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/comments?post=37774"}],"version-history":[{"count":1,"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/blog\/37774\/revisions"}],"predecessor-version":[{"id":45932,"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/blog\/37774\/revisions\/45932"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/media\/37775"}],"wp:attachment":[{"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/media?parent=37774"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.i-exceed.com\/us\/wp-json\/wp\/v2\/coauthors?post=37774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}