{"id":18674,"date":"2026-02-26T10:00:00","date_gmt":"2026-02-26T09:00:00","guid":{"rendered":"https:\/\/www.setlog.com\/?p=18674"},"modified":"2026-02-25T11:48:05","modified_gmt":"2026-02-25T10:48:05","slug":"cyber-resilience-the-overlooked-risk-in-digital-supply-chains","status":"publish","type":"post","link":"https:\/\/www.setlog.com\/en\/cyber-resilience-the-overlooked-risk-in-digital-supply-chains","title":{"rendered":"Cyber Resilience: The Overlooked Risk in Digital Supply Chains"},"content":{"rendered":"\n<p>When companies discuss <a href=\"https:\/\/info.setlog.com\/en\/scm-trends-2026\" target=\"_blank\" rel=\"noreferrer noopener\">supply chain risks in 2026<\/a>, the focus typically falls on <a href=\"https:\/\/www.setlog.com\/en\/geopolitical-fragmentation-why-global-supply-chains-are-being-deliberately-reordered-in-2026\">geopolitics<\/a>, trade barriers, or critical raw materials. Yet one of the most underestimated trends lies within the digital backbone of modern supply networks: cyber resilience. As processes become increasingly automated, platforms more interconnected, and data flows fully integrated, digital stability is emerging as a strategic priority.<\/p>\n\n\n\n<p>Cyber resilience is no longer an isolated IT concern. It has become a fundamental requirement for stable supply chain operations. In an environment where efficiency and transparency depend entirely on functioning systems, digital security increasingly determines whether companies can maintain continuity and competitiveness.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Digital Dependency as a Systemic Risk<\/h3>\n\n\n\n<p>Cloud-based platforms, automated procurement workflows, supplier portals, and integrated transportation management systems are now standard components of supply chain management. Without reliable data flows, operational control quickly deteriorates. That dependency creates a new category of risk.<\/p>\n\n\n\n<p>Ransomware attacks on logistics providers, manipulated shipment data, or compromised supplier platforms can disrupt entire value chains. The issue rarely remains isolated. Modern supply networks are built on tightly connected partners across multiple tiers. Every interface \u2014 from raw material suppliers to freight forwarders \u2014 expands the potential attack surface.<\/p>\n\n\n\n<p>The more centralized and automated processes become, the greater the operational consequences of a disruption. A cyber incident is no longer a technical inconvenience. It is an operational event with direct financial and reputational impact.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why Traditional IT Security Is Not Enough<\/h3>\n\n\n\n<p>Many organizations have already invested in firewalls, backup systems, and access controls. Yet a structural weakness often remains: cybersecurity is treated separately from supply chain strategy.<\/p>\n\n\n\n<p>True resilience is not defined by the absence of attacks. It is defined by the ability to remain operational when incidents occur. How quickly can alternative processes be activated? Which systems are mission-critical? Where do hidden digital dependencies exist?<\/p>\n\n\n\n<p>In global supply chains, even short outages can lead to production stoppages, missed deliveries, contractual penalties, and long-term reputational damage. As digital orchestration becomes more sophisticated, the strategic relevance of cyber resilience increases proportionally.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zero Trust and Network-Wide Transparency<\/h3>\n\n\n\n<p>By 2026, protecting internal infrastructure is no longer sufficient. Cyber resilience must extend across the entire supply chain network. Concepts such as Zero Trust architectures, encrypted data environments, and continuous risk assessments across business partners are becoming standard practice.<\/p>\n\n\n\n<p>The challenge intensifies when working with international suppliers. Varying cybersecurity standards, regulatory environments, and levels of digital maturity make consistent protection more complex. Cyber resilience therefore becomes a coordination effort that reaches far beyond internal IT departments.<\/p>\n\n\n\n<p>Transparency is essential. Companies must understand which digital dependencies exist and which processes must be prioritized in the event of disruption. Without this visibility, security measures remain reactive rather than strategic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Digital Stability as a Competitive Advantage<\/h3>\n\n\n\n<p>Cyber resilience is therefore not merely a defensive mechanism. It is a strategic component of modern supply chain architecture \u2014 and a defining factor in whether digital transformation strengthens stability or creates new vulnerabilities.<\/p>\n\n\n\n<p>It also represents one of the structural shifts shaping supply chain management in 2026. Digital security does not stand alone; it intersects with geopolitical risk, AI-driven decision models, platform-based collaboration, and organizational adaptability. Resilience in 2026 is systemic, not isolated.<\/p>\n\n\n\n<p>\ud83d\udc49 <a href=\"https:\/\/info.setlog.com\/en\/scm-trends-2026\" target=\"_blank\" rel=\"noreferrer noopener\">Explore all ten defining Supply Chain Trends 2026 in our full checklist and identify the strategic priorities that demand action now.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When companies discuss supply chain risks in 2026, the focus typically falls on geopolitics, trade barriers, or critical raw materials. Yet one of the most underestimated trends lies within the digital backbone of modern supply networks: cyber resilience. As processes become increasingly automated, platforms more interconnected, and data flows fully integrated, digital stability is emerging [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":18678,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","inline_featured_image":false,"footnotes":""},"categories":[35,9,360],"tags":[],"class_list":["post-18674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","category-setblog","category-supply-chain-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Resilience: The Overlooked Risk in Digital Supply Chains - Setlog<\/title>\n<meta name=\"description\" content=\"Digital supply chains are increasingly vulnerable. Why cyber resilience is becoming essential for stable SCM operations in 2026.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience: The Overlooked Risk in Digital Supply Chains - Setlog\" \/>\n<meta property=\"og:description\" content=\"Digital supply chains are increasingly vulnerable. Why cyber resilience is becoming essential for stable SCM operations in 2026.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten\" \/>\n<meta property=\"og:site_name\" content=\"Setlog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SetlogGmbH\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-26T09:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Linda Kololli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@setloggmbh\" \/>\n<meta name=\"twitter:site\" content=\"@setloggmbh\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linda Kololli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten\"},\"author\":{\"name\":\"Linda Kololli\",\"@id\":\"https:\/\/www.setlog.com\/#\/schema\/person\/f4bf0b0ccd82edb4aa447190f3ae0dd4\"},\"headline\":\"Cyber Resilience: The Overlooked Risk in Digital Supply Chains\",\"datePublished\":\"2026-02-26T09:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten\"},\"wordCount\":549,\"publisher\":{\"@id\":\"https:\/\/www.setlog.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png\",\"articleSection\":[\"IT\",\"SetBlog\",\"Supply Chain Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten\",\"url\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten\",\"name\":\"Cyber Resilience: The Overlooked Risk in Digital Supply Chains - Setlog\",\"isPartOf\":{\"@id\":\"https:\/\/www.setlog.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png\",\"datePublished\":\"2026-02-26T09:00:00+00:00\",\"description\":\"Digital supply chains are increasingly vulnerable. Why cyber resilience is becoming essential for stable SCM operations in 2026.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#primaryimage\",\"url\":\"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png\",\"contentUrl\":\"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png\",\"width\":1920,\"height\":1080,\"caption\":\"Setlog Blog Cyber Resilience Preview\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.setlog.com\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Resilience: The Overlooked Risk in Digital Supply Chains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.setlog.com\/#website\",\"url\":\"https:\/\/www.setlog.com\/\",\"name\":\"Setlog\",\"description\":\"How to Setlog\",\"publisher\":{\"@id\":\"https:\/\/www.setlog.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.setlog.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.setlog.com\/#organization\",\"name\":\"Setlog\",\"url\":\"https:\/\/www.setlog.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.setlog.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.setlog.com\/app\/uploads\/2018\/05\/logo-setlog.svg\",\"contentUrl\":\"https:\/\/www.setlog.com\/app\/uploads\/2018\/05\/logo-setlog.svg\",\"width\":1,\"height\":1,\"caption\":\"Setlog\"},\"image\":{\"@id\":\"https:\/\/www.setlog.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SetlogGmbH\/\",\"https:\/\/x.com\/setloggmbh\",\"https:\/\/de.linkedin.com\/company\/setloggroup\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.setlog.com\/#\/schema\/person\/f4bf0b0ccd82edb4aa447190f3ae0dd4\",\"name\":\"Linda Kololli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c01abf89ff72c937c906c991c31aed2f1b5e7d8230f70cdb39bf9ccbd4bd9060?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c01abf89ff72c937c906c991c31aed2f1b5e7d8230f70cdb39bf9ccbd4bd9060?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c01abf89ff72c937c906c991c31aed2f1b5e7d8230f70cdb39bf9ccbd4bd9060?s=96&d=mm&r=g\",\"caption\":\"Linda Kololli\"},\"url\":\"https:\/\/www.setlog.com\/en\/author\/linda-kololli\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Resilience: The Overlooked Risk in Digital Supply Chains - Setlog","description":"Digital supply chains are increasingly vulnerable. Why cyber resilience is becoming essential for stable SCM operations in 2026.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten","og_locale":"en_US","og_type":"article","og_title":"Cyber Resilience: The Overlooked Risk in Digital Supply Chains - Setlog","og_description":"Digital supply chains are increasingly vulnerable. Why cyber resilience is becoming essential for stable SCM operations in 2026.","og_url":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten","og_site_name":"Setlog","article_publisher":"https:\/\/www.facebook.com\/SetlogGmbH\/","article_published_time":"2026-02-26T09:00:00+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png","type":"image\/png"}],"author":"Linda Kololli","twitter_card":"summary_large_image","twitter_creator":"@setloggmbh","twitter_site":"@setloggmbh","twitter_misc":{"Written by":"Linda Kololli","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#article","isPartOf":{"@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten"},"author":{"name":"Linda Kololli","@id":"https:\/\/www.setlog.com\/#\/schema\/person\/f4bf0b0ccd82edb4aa447190f3ae0dd4"},"headline":"Cyber Resilience: The Overlooked Risk in Digital Supply Chains","datePublished":"2026-02-26T09:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten"},"wordCount":549,"publisher":{"@id":"https:\/\/www.setlog.com\/#organization"},"image":{"@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#primaryimage"},"thumbnailUrl":"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png","articleSection":["IT","SetBlog","Supply Chain Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten","url":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten","name":"Cyber Resilience: The Overlooked Risk in Digital Supply Chains - Setlog","isPartOf":{"@id":"https:\/\/www.setlog.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#primaryimage"},"image":{"@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#primaryimage"},"thumbnailUrl":"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png","datePublished":"2026-02-26T09:00:00+00:00","description":"Digital supply chains are increasingly vulnerable. Why cyber resilience is becoming essential for stable SCM operations in 2026.","breadcrumb":{"@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#primaryimage","url":"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png","contentUrl":"https:\/\/www.setlog.com\/app\/uploads\/2026\/02\/Landing-Page-Blog-Grafiken-1-4.png","width":1920,"height":1080,"caption":"Setlog Blog Cyber Resilience Preview"},{"@type":"BreadcrumbList","@id":"https:\/\/www.setlog.com\/cyber-resilienz-das-unterschaetzte-risiko-digitaler-lieferketten#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.setlog.com\/en"},{"@type":"ListItem","position":2,"name":"Cyber Resilience: The Overlooked Risk in Digital Supply Chains"}]},{"@type":"WebSite","@id":"https:\/\/www.setlog.com\/#website","url":"https:\/\/www.setlog.com\/","name":"Setlog","description":"How to Setlog","publisher":{"@id":"https:\/\/www.setlog.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.setlog.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.setlog.com\/#organization","name":"Setlog","url":"https:\/\/www.setlog.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.setlog.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.setlog.com\/app\/uploads\/2018\/05\/logo-setlog.svg","contentUrl":"https:\/\/www.setlog.com\/app\/uploads\/2018\/05\/logo-setlog.svg","width":1,"height":1,"caption":"Setlog"},"image":{"@id":"https:\/\/www.setlog.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SetlogGmbH\/","https:\/\/x.com\/setloggmbh","https:\/\/de.linkedin.com\/company\/setloggroup"]},{"@type":"Person","@id":"https:\/\/www.setlog.com\/#\/schema\/person\/f4bf0b0ccd82edb4aa447190f3ae0dd4","name":"Linda Kololli","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c01abf89ff72c937c906c991c31aed2f1b5e7d8230f70cdb39bf9ccbd4bd9060?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c01abf89ff72c937c906c991c31aed2f1b5e7d8230f70cdb39bf9ccbd4bd9060?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c01abf89ff72c937c906c991c31aed2f1b5e7d8230f70cdb39bf9ccbd4bd9060?s=96&d=mm&r=g","caption":"Linda Kololli"},"url":"https:\/\/www.setlog.com\/en\/author\/linda-kololli"}]}},"_links":{"self":[{"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/posts\/18674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/comments?post=18674"}],"version-history":[{"count":3,"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/posts\/18674\/revisions"}],"predecessor-version":[{"id":18684,"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/posts\/18674\/revisions\/18684"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/media\/18678"}],"wp:attachment":[{"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/media?parent=18674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/categories?post=18674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.setlog.com\/en\/wp-json\/wp\/v2\/tags?post=18674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}