{"id":19004,"date":"2026-02-03T13:28:20","date_gmt":"2026-02-03T12:28:20","guid":{"rendered":"https:\/\/nexis-secure.com\/en\/insights\/blog\/\/"},"modified":"2026-04-21T09:14:04","modified_gmt":"2026-04-21T07:14:04","slug":"nexis-impulse-february","status":"publish","type":"post","link":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/","title":{"rendered":"NEXIS Impulse February"},"content":{"rendered":"<h2>Welcome to the February Edition of NEXIS Impulse!<\/h2>\n<p>Every month we keep you informed about current developments at Nexis, share insights into our NEXIS Platform, NEXIS and QSEC, and provide updates from the world of Identity Analytics &amp; Access Governance and GRC.<\/p>\n<p>Enjoy reading! \ud83d\udc99<\/p>\n<p>&nbsp;<\/p>\n<h2>\ud83d\udcc5 Don&#8217;t Miss Our Upcoming Webinars!<\/h2>\n<p><strong>\ud83d\udd0d The Rise of the IVIP &#8211; Game Changer or Hype?<\/strong><\/p>\n<p>Cloud, SaaS sprawl, non-human identities, and AI-driven access are pushing traditional IAM and IGA to their limits. One challenge stands out across all environments: visibility.<br \/>\nIn this webinar, Dr. Heiko Klarl (CEO, Nexis), Dr. Maarten Decat (CEO &amp; Co-Founder, Elimity) and Timo Copp (Managing Director, SonicBee) discuss Gartner&#8217;s new category Identity Visibility and Intelligence Platforms (IVIP).<\/p>\n<p>\ud83d\udcc5 February 26, 2026 | \ud83d\udd51 3:00 p.m. CET | \ud83c\udf10 Language: English | Format: Live with Q&amp;A<\/p>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/insights\/webinar\/\">Register Now<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>\ud83e\udd16 AI You Can Trust &#8211; Transparent Identity Governance with NEXIS<\/strong><\/p>\n<p>AI is becoming a core capability of modern Identity Governance, but it only creates value when decisions remain transparent, explainable, and under human control.<br \/>\nIn this interactive webinar Dr. Heiko Klarl (CEO, Nexis) and Viktoria M\u00fcller (IAM Consultant, Nexis) show how AI and machine learning are applied across the NEXIS Platform to improve recertifications, access decisions, role mining, application onboarding, and IAM Governance Documentation.<\/p>\n<p>\ud83d\udcc5 March 12, 2026 | \ud83d\udd51 4:00 p.m. CET | \ud83c\udf10 Language: English | Format: Live with Q&amp;A<\/p>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/webinars\/ai-you-can-trust\/\">Register Now<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>\ud83e\udde9 ICT Risk Management in Practice &#8211; Data Collection, Methods and Live Showcase<\/strong><\/p>\n<p>Effective ICT risk management requires more than frameworks and policies. It needs structured data, clear methods, and seamless integration into existing system landscapes.<br \/>\nIn this webinar Jonas Link (Product Manager QSEC, Nexis) and Nabil Arzouni (Information Security Officer, IKB) demonstrate how ICT risk management can be implemented in a practical and controllable way, from structured data collection to hands-on execution directly in the tool.<\/p>\n<p>\ud83d\udcc5 March 17, 2026 | \ud83d\udd51 3:00 p.m. CET | \ud83c\udf10 Language: English | Format: Live with Q&amp;A<\/p>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/webinars\/ict-risk-management-in-practice\/\">Register Now<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>\ud83e\udde0 New Blog Article: OWASP Top 10 2025 and the Identity Reality Gap &#8211; Why Application Security Alone No Longer Closes Enterprise Risk<\/h2>\n<p>In his latest blog post, Dr. Heiko Klarl takes a critical look at the OWASP Top 10 2025 and explains why many of today\u2019s most critical risks persist even when application security controls are in place.<\/p>\n<p>The article shows how broken access control, misconfiguration, supply chain risk, and insecure design increasingly originate from insufficient identity, access, and third-party governance rather than vulnerable code alone. Using concrete OWASP categories, it outlines how continuous access governance, Identity Visibility and Intelligence, and structured IAM Governance Documentation help close this enterprise reality gap.<\/p>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/insights\/blog\/owasp\/\">Read the Full Blog Post<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>\u2b50 Analyst Recognition<\/h2>\n<p>We are proud that over the past year, Nexis has been referenced in multiple reports by leading analyst firms, underlining the growing relevance of Identity Visibility, Intelligence, and Governance in complex enterprise environments.<\/p>\n<p>In particular, Gartner and KuppingerCole have highlighted Nexis across several publications, including research on Identity Visibility and Intelligence Platforms (IVIP), AI-driven access governance, and modern Identity Governance and Administration.<\/p>\n<p>\ud83d\udc49 <a href=\"https:\/\/nexis-secure.com\/en\/insights\/analyst-reports\/\">Have a Look at the Overview of All Analyst Reports and References<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>\ud83c\udf99\ufe0f Podcast Feature &#8211; IAM Success Starts with Honesty<\/h2>\n<p>Dr. Heiko Klarl was a guest on The Cyber Security Matters podcast by neuco. The conversation moves beyond tools and frameworks and focuses on a core reason why IAM initiatives stall: a lack of honest visibility into the current state of identity and access management.<br \/>\nHeiko shares why realistic assessments, trusted data, and clear ownership are essential for sustainable identity governance.<\/p>\n<p>A thoughtful episode for security and IAM leaders who want to understand why identity security is as much about people and processes as it is about technology.<\/p>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/webinars\/neuco-podcast\/\">Listen to the Podcast<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>\u26a1 IAM Application Onboarding &#8211; Be Fast and Save Money<\/h2>\n<p>IAM Application onboarding is one of the biggest bottlenecks in IGA. Manual data collection, fragmented documentation, and late involvement of application owners slow projects down and increase risk.<\/p>\n<p>NEXIS IAM Application Onboarding brings structure and automation to this process:<\/p>\n<ul>\n<li>AI-supported information gathering from existing documents<\/li>\n<li>Built-in authorization concepts for regulated environments<\/li>\n<li>Direct involvement of application owners with clear ownership<\/li>\n<li>Automated SoD and risk checks<\/li>\n<li>Onboarding in hours instead of days<\/li>\n<\/ul>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/solutions\/iam\/application-onboarding\/\">Learn How to Onboard Applications Easily<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the February Edition of NEXIS Impulse! Every month we keep you informed about current developments at Nexis, share insights into our NEXIS Platform, NEXIS and QSEC, and provide updates from the world of Identity Analytics &amp; Access Governance and GRC. Enjoy reading! \ud83d\udc99 &nbsp; \ud83d\udcc5 Don&#8217;t Miss Our Upcoming Webinars! \ud83d\udd0d The Rise&#8230;<\/p>\n","protected":false},"author":9,"featured_media":19005,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[68,1,69,70],"tags":[],"class_list":["post-19004","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-grc","category-iam","category-news","category-nexis-impulse","vs-blog blog-single"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NEXIS Impulse February - NEXIS Platform<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NEXIS Impulse February - NEXIS Platform\" \/>\n<meta property=\"og:description\" content=\"Welcome to the February Edition of NEXIS Impulse! Every month we keep you informed about current developments at Nexis, share insights into our NEXIS Platform, NEXIS and QSEC, and provide updates from the world of Identity Analytics &amp; Access Governance and GRC. Enjoy reading! \ud83d\udc99 &nbsp; \ud83d\udcc5 Don&#8217;t Miss Our Upcoming Webinars! \ud83d\udd0d The Rise...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS Platform\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-03T12:28:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-21T07:14:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"vSteinberger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vSteinberger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/\"},\"author\":{\"name\":\"vSteinberger\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/5050b63bae737b3b4a583dbd88c1e704\"},\"headline\":\"NEXIS Impulse February\",\"datePublished\":\"2026-02-03T12:28:20+00:00\",\"dateModified\":\"2026-04-21T07:14:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/\"},\"wordCount\":694,\"publisher\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog.png\",\"articleSection\":[\"GRC\",\"IAM\",\"NEWS\",\"NEXIS IMPULSE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/\",\"url\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/\",\"name\":\"NEXIS Impulse February - NEXIS Platform\",\"isPartOf\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog.png\",\"datePublished\":\"2026-02-03T12:28:20+00:00\",\"dateModified\":\"2026-04-21T07:14:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#primaryimage\",\"url\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog.png\",\"contentUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/nexis-secure.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NEXIS Impulse February\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#website\",\"url\":\"https:\/\/nexis-secure.com\/en\/\",\"name\":\"NEXIS Platform\",\"description\":\"The modular identity governance platform for regulated enterprise\",\"publisher\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#organization\"},\"alternateName\":\"Nexis\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nexis-secure.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#organization\",\"name\":\"Nexis Group\",\"alternateName\":\"Nexis\",\"url\":\"https:\/\/nexis-secure.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png\",\"contentUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png\",\"width\":2560,\"height\":635,\"caption\":\"Nexis Group\"},\"image\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/5050b63bae737b3b4a583dbd88c1e704\",\"name\":\"vSteinberger\",\"url\":\"https:\/\/nexis-secure.com\/en\/author\/vsteinberger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NEXIS Impulse February - NEXIS Platform","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/","og_locale":"en_US","og_type":"article","og_title":"NEXIS Impulse February - NEXIS Platform","og_description":"Welcome to the February Edition of NEXIS Impulse! Every month we keep you informed about current developments at Nexis, share insights into our NEXIS Platform, NEXIS and QSEC, and provide updates from the world of Identity Analytics &amp; Access Governance and GRC. Enjoy reading! \ud83d\udc99 &nbsp; \ud83d\udcc5 Don&#8217;t Miss Our Upcoming Webinars! \ud83d\udd0d The Rise...","og_url":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/","og_site_name":"NEXIS Platform","article_published_time":"2026-02-03T12:28:20+00:00","article_modified_time":"2026-04-21T07:14:04+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog-1024x576.png","type":"image\/png"}],"author":"vSteinberger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"vSteinberger","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#article","isPartOf":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/"},"author":{"name":"vSteinberger","@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/5050b63bae737b3b4a583dbd88c1e704"},"headline":"NEXIS Impulse February","datePublished":"2026-02-03T12:28:20+00:00","dateModified":"2026-04-21T07:14:04+00:00","mainEntityOfPage":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/"},"wordCount":694,"publisher":{"@id":"https:\/\/nexis-secure.com\/en\/#organization"},"image":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#primaryimage"},"thumbnailUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog.png","articleSection":["GRC","IAM","NEWS","NEXIS IMPULSE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/","url":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/","name":"NEXIS Impulse February - NEXIS Platform","isPartOf":{"@id":"https:\/\/nexis-secure.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#primaryimage"},"image":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#primaryimage"},"thumbnailUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog.png","datePublished":"2026-02-03T12:28:20+00:00","dateModified":"2026-04-21T07:14:04+00:00","breadcrumb":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#primaryimage","url":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog.png","contentUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/02\/NEXIS-Impulse-February-Blog.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-february\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/nexis-secure.com\/en\/"},{"@type":"ListItem","position":2,"name":"NEXIS Impulse February"}]},{"@type":"WebSite","@id":"https:\/\/nexis-secure.com\/en\/#website","url":"https:\/\/nexis-secure.com\/en\/","name":"NEXIS Platform","description":"The modular identity governance platform for regulated enterprise","publisher":{"@id":"https:\/\/nexis-secure.com\/en\/#organization"},"alternateName":"Nexis","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nexis-secure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nexis-secure.com\/en\/#organization","name":"Nexis Group","alternateName":"Nexis","url":"https:\/\/nexis-secure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png","contentUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png","width":2560,"height":635,"caption":"Nexis Group"},"image":{"@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/5050b63bae737b3b4a583dbd88c1e704","name":"vSteinberger","url":"https:\/\/nexis-secure.com\/en\/author\/vsteinberger\/"}]}},"_links":{"self":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts\/19004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/comments?post=19004"}],"version-history":[{"count":4,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts\/19004\/revisions"}],"predecessor-version":[{"id":19775,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts\/19004\/revisions\/19775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/media\/19005"}],"wp:attachment":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/media?parent=19004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/categories?post=19004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/tags?post=19004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}