  {"id":18146,"date":"2023-12-05T18:00:53","date_gmt":"2023-12-05T23:00:53","guid":{"rendered":"https:\/\/d3.harvard.edu\/platform-digit\/?post_type=hck-submission&#038;p=18146"},"modified":"2023-12-05T18:14:24","modified_gmt":"2023-12-05T23:14:24","slug":"darktrace-leveraging-ai-in-cybersecurity","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/","title":{"rendered":"Darktrace &#8211; Leveraging AI in Cybersecurity"},"content":{"rendered":"\n\n\n<p>Artificial intelligence is being increasingly utilized by cyber criminals to mount sophisticated attacks on both enterprises and individuals. As companies continue to digitize their services and platforms and consumers&#8217; data and communications continue to be propagated through IoT devices onto the cloud, the nodes of attack available to cyber criminals will increase. Darktrace is at the vanguard of companies bridging the gap between the A.I forwardness of cyber criminals and enterprises.<\/p>\n\n\n\n<p>Founded in 2013, Darktrace is an artificial intelligence-based cyber security company headquartered in Cambridge, United Kingdom. The company leverages A.I innovations in a proactive approach to identify, investigate, and remediate cyber-security threats in real-time. The market has rewarded this approach with the company\u2019s IPO valuation in 2021 being \u00a31.5 billion ($2.4 billion) and presently serving ~8,800 customers in 110 countries.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"459\" src=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-9-1024x459.png\" alt=\"\" class=\"wp-image-18183\" srcset=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-9-1024x459.png 1024w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-9-300x135.png 300w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-9-768x344.png 768w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-9-1536x689.png 1536w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-9-2048x918.png 2048w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-9-600x269.png 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Value Creation through AI in the Cybersecurity Industry<\/strong><\/p>\n\n\n\n<p>&nbsp;Darktrace\u2019s machine learning models deviate from traditional supervised learning models that utilize encounters with threats in the past to learn and predict threats in the future. Its models instead \u201cself-learn\u201d in real-time by monitoring user, device, and connection behavior to then define normal vs. anomalous activity, the latter of which it then identifies as being threats or not.<\/p>\n\n\n\n<p>The first dimension of differentiation and mode of value creation that Darktrace provides to its customers is a proactive as opposed to a reactive approach to cybersecurity. Cybersecurity solutions are predominantly reactive: a threat has attacked a system or device and remediation is taken to eliminate the threat. The solutions then aggregate learnings from attacks in the past to prevent the same or similar attacks in the future. While elimination of a attack is a considerable value add, the successful attack itself can be debilitating to an organization with loss of revenue, potential breach in customer data, and loss of customer confidence. Organizations and individuals want to be in a place where attacks rarely if ever happen. With their real-time monitoring system, Darktrace can identify threats early in the attack sequence through identification of the subtlest deviation with normal user and network behavior. &nbsp;From there, the system begins to take remedial steps to eliminate the threat before it propagates through the system. Other advantages of this proactive approach are the use of the business data for relevance in detecting anomalies instead of large data lakes, data remains with the company instead of being piped through a public cloud, and the ability to protect against targeted AI attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"752\" src=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-6.png\" alt=\"\" class=\"wp-image-18153\" srcset=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-6.png 975w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-6-300x231.png 300w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-6-768x592.png 768w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-6-600x463.png 600w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n\n\n\n<p>&nbsp;The second dimension of differentiation and mode of value creation that Darktrace provides to its customers is an autonomous and automatic cybersecurity suite. Darktrace doesn\u2019t require human definition of attack signatures. This is advantageous in that human definition of attack signatures have a time-lag with respect to the latest cybersecurity threats, i.e., human definitions are based on known attacks, whereas, signatures of future attacks might be unknown. The ability of Darktrace to autonomously determine these attack signatures and automatically take remedial action increases protection efficacy and reduces system downtime from an attack that successfully propagates through the system waiting for human intervention. To speak to these advantages, Darktrace reports a 95.83% reduction in the time to identify potential threats in the real estate industry, an average response time of 2.5 minutes in the manufacturing industry and 90% reduction in the time to identify and prioritize threats in the healthcare industry.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"199\" src=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-7.png\" alt=\"\" class=\"wp-image-18156\" srcset=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-7.png 975w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-7-300x61.png 300w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-7-768x157.png 768w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-7-600x122.png 600w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Value Capture<\/strong><\/p>\n\n\n\n<p>Darktrace captures value through four product offerings: Darktrace PREVENT, DETECT, RESPOND, and HEAL. Customers purchasing all four products benefit from Darktrace\u2019s Cyber AI Loop with end-to-end protection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"376\" src=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-8.png\" alt=\"\" class=\"wp-image-18158\" srcset=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-8.png 975w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-8-300x116.png 300w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-8-768x296.png 768w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/image-8-600x231.png 600w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n\n\n\n<p>Darktrace PREVENT acts as the proactive first line of defense that continuously monitors the system in real time and simulates attacks to gauge the networks vulnerable nodes to provide the customer with key trends and metrics on the evolution of their risk profile, attack path modeling and scenario analysis. Darktrace DETECT, focuses on detecting emerging threats within the customers\u2019 cloud, app, and email platforms, endpoints, and networks to be fed to the Darktrace RESPOND which disarms the threat. Darktrace HEAL then restores the business\u2019s assets to an operational state.<\/p>\n\n\n\n<p><strong>Challenges<\/strong><\/p>\n\n\n\n<p>&nbsp;A significant challenge that I believe Darktrace\u2019s self-learning real-time models face is the determination of false positives and false negatives and the ramifications of falling into either. It seems to me that the company should probably skew their algorithms to prevent false negatives (not detecting a genuine cyber threat), but they should also mitigate the potential downside of acting on a false positive. A key area of curiosity for me here is whether their PREVENT, DETECT, RESPOND, and HEAL staging would amplify or attenuate false negatives and positives as the algorithm&#8217;s analysis propagates from one stage to the next. Another challenge that I think the company faces is navigating the myriad of regulatory environments in the 110 countries that they operate in.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Sources: <\/p>\n\n\n\n<p>&#8220;Products.&#8221; Darktrace, December 3, 2023,&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/darktrace.com\/products\" target=\"_blank\">https:\/\/darktrace.com\/products<\/a>.<\/p>\n\n\n\n<p>&#8220;Darktrace, The Future of Cyber Security.&#8221; Devoteam, 3 Dec. 2023,&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.devoteam.com\/expert-view\/darktrace-the-future-of-cyber-security\/\" target=\"_blank\">https:\/\/www.devoteam.com\/expert-view\/darktrace-the-future-of-cyber-security\/<\/a><\/p>\n\n\n\n<p>&#8220;Cyber AI | One on One Security | Darktrace.&#8221; Darktrace, 5 Dec. 2023,&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/darktrace.com\/cyber-ai\" target=\"_blank\">https:\/\/darktrace.com\/cyber-ai<\/a><\/p>\n\n\n\n<p>&#8220;Darktrace shares soar 43% in London IPO as investors shrug off Deliveroo flop.&#8221; CNBC, 30 Apr. 2021,&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cnbc.com\/2021\/04\/30\/darktrace-ipo-dark-stock-skyrockets-43percent-in-london-debut.html\" target=\"_blank\">https:\/\/www.cnbc.com\/2021\/04\/30\/darktrace-ipo-dark-stock-skyrockets-43percent-in-london-debut.html<\/a>.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bridging the gap in AI forwardness between cyber criminals and enterprises<\/p>\n","protected":false},"author":19388,"featured_media":18151,"comment_status":"open","ping_status":"closed","template":"","categories":[],"class_list":["post-18146","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-digit\/assignment\/machine-learning-4\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Darktrace - Leveraging AI in Cybersecurity - Digital Innovation and Transformation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Darktrace - Leveraging AI in Cybersecurity - Digital Innovation and Transformation\" \/>\n<meta property=\"og:description\" content=\"Bridging the gap in AI forwardness between cyber criminals and enterprises\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Innovation and Transformation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-05T23:14:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/Darktrace-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"511\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-leveraging-ai-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-leveraging-ai-in-cybersecurity\\\/\",\"name\":\"Darktrace - Leveraging AI in Cybersecurity - Digital Innovation and Transformation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-leveraging-ai-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-leveraging-ai-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/12\\\/Darktrace-1.jpg\",\"datePublished\":\"2023-12-05T23:00:53+00:00\",\"dateModified\":\"2023-12-05T23:14:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-leveraging-ai-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-leveraging-ai-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-leveraging-ai-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/12\\\/Darktrace-1.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/12\\\/Darktrace-1.jpg\",\"width\":900,\"height\":511,\"caption\":\"Abstract background of technology and science. Mesh or net with lines and geometric shapes detail.3d illustration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-leveraging-ai-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Darktrace &#8211; Leveraging AI in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/\",\"name\":\"Digital Innovation and Transformation\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Darktrace - Leveraging AI in Cybersecurity - Digital Innovation and Transformation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Darktrace - Leveraging AI in Cybersecurity - Digital Innovation and Transformation","og_description":"Bridging the gap in AI forwardness between cyber criminals and enterprises","og_url":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/","og_site_name":"Digital Innovation and Transformation","article_modified_time":"2023-12-05T23:14:24+00:00","og_image":[{"width":900,"height":511,"url":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/Darktrace-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/","url":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/","name":"Darktrace - Leveraging AI in Cybersecurity - Digital Innovation and Transformation","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/Darktrace-1.jpg","datePublished":"2023-12-05T23:00:53+00:00","dateModified":"2023-12-05T23:14:24+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/Darktrace-1.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2023\/12\/Darktrace-1.jpg","width":900,"height":511,"caption":"Abstract background of technology and science. Mesh or net with lines and geometric shapes detail.3d illustration"},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-leveraging-ai-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-digit\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/"},{"@type":"ListItem","position":3,"name":"Darktrace &#8211; Leveraging AI in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-digit\/#website","url":"https:\/\/d3.harvard.edu\/platform-digit\/","name":"Digital Innovation and Transformation","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-digit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission\/18146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/users\/19388"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/comments?post=18146"}],"version-history":[{"count":9,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission\/18146\/revisions"}],"predecessor-version":[{"id":18184,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission\/18146\/revisions\/18184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/media\/18151"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/media?parent=18146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/categories?post=18146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}