{"id":785,"date":"2025-05-05T14:48:46","date_gmt":"2025-05-05T18:48:46","guid":{"rendered":"https:\/\/ami2025dev.wpenginepowered.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/"},"modified":"2025-05-05T14:48:46","modified_gmt":"2025-05-05T18:48:46","slug":"ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard","status":"publish","type":"project","link":"https:\/\/www.ami.com\/resource\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/","title":{"rendered":"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard"},"content":{"rendered":"<h4><strong><em>One Truth <\/em><\/strong><strong><em>(of Many) <\/em><\/strong><strong><em>of The Information Age: Security Matters<\/em><\/strong><\/h4>\n<p>In a way, talking about information and data security is like talking about brushing one\u2019s teeth: we all know it is important, and exhibiting consistency and strong daily habits is essential to avoid catastrophic issues (and pain!) in the future.<\/p>\n<p>At AMI, as developers of critical system firmware for all types of compute platforms worldwide \u2013 from servers to notebooks to industrial computers and beyond &#8211; we have a deep understanding of the importance of assuring our customers, platform end-users and the industry at large that we are adhering to the highest standard of security practices and benchmarks.<\/p>\n<p>That\u2019s why AMI participates in security performance monitoring by <a href=\"https:\/\/scores.securityscorecard.io\/security-rating\/ami.com?utm_medium=badge&amp;utm_source=ami.com&amp;utm_campaign=seal-of-trust&amp;utm_content=https:\/\/www.ami.com\/\" target=\"_blank\" rel=\"noopener\">SecurityScorecode<\/a>, a real-time security score monitoring organization based in the US. AMI is proud to consistently receive an \u201cA\u201d rating, earning a score of 95\/100 or higher, as updated in real-time on the <a href=\"https:\/\/www.ami.com\/trust-center\/\" target=\"_blank\" rel=\"noopener\">AMI Trust Center<\/a> section of our website.<\/p>\n<h4><strong><em>What is SecurityScorecard?<\/em><\/strong><\/h4>\n<p>SecurityScorecard bills itself as \u201cthe largest proprietary risk and threat intelligence dataset on the planet.\u201d Its mission is to \u201cmake the world a safer place by transforming the way the world measures and manages cybersecurity risk across the entire digital ecosystem.\u201d<\/p>\n<p>It does so by providing real-time security score data for monitored organizations and allows participants to display that score as a measure of their security posture, as well as examine any areas of deficiency. A detailed breakdown of the methodology used by SecurityScorecard to calculate an organization\u2019s score can be found at <a href=\"https:\/\/securityscorecard.com\/trust\/?_gl=1*18zm98a*_gcl_au*NTE2MTk4NTg3LjE3NDU4NjIzODg.*_ga*MjQwNTI2NTc4LjE3NDU4NjIzODg.*_ga_NMMJ3760R6*MTc0NTg2NzM4Ny4yLjEuMTc0NTg2NzQ0Mi41LjAuMA..\" target=\"_blank\" rel=\"noopener\">Trust &#8211; SecurityScorecard<\/a>.<\/p>\n<h4><strong><em>The Benefits of SecurityScorecard<\/em><\/strong><\/h4>\n<p>As part of holistic security practices, businesses and organizations should regularly evaluate the SecurityScorecard of their hardware, software, and firmware vendors to streamline their vendor risk management program. A SecurityScorecard offers real-time, comprehensive cybersecurity ratings that:<\/p>\n<p><em>Continuously Monitor Third-Party Risk<\/em><\/p>\n<p>SecurityScorecard allows organizations to assess the cybersecurity posture of vendors, partners, and supply chains, helping to prevent breaches that originate from external relationships. With continuous monitoring, organizations stay on top of security incidents or security score changes early &#8211; sometimes before attackers exploit the gaps &#8211; reducing friction in third-party risk processes.<\/p>\n<p><em>Get an Independent, Objective View<\/em><\/p>\n<p>The SecurityScorecard platform provides an outside-in view of your own organization&#8217;s security health, identifying vulnerabilities you may not catch internally.<\/p>\n<p><em>Prioritize and Remediate Threats Faster<\/em><\/p>\n<p>The comprehensive scoring system highlights critical weaknesses across areas like application security, network security, DNS health, and patching cadence, helping teams prioritize remediation efforts.<\/p>\n<p><em>Support Compliance and Regulatory Requirements<\/em><\/p>\n<p>Security ratings can support frameworks like NIST, ISO, GDPR, and CMMC by offering documented, measurable evidence of cyber risk management.<\/p>\n<h4><strong><em>AMI&#8217;s Commitment<\/em><\/strong><\/h4>\n<p>\u201cWe are extremely proud of our continued A-level rating with SecurityScorecard. Our AMI security team works tirelessly to maintain a strong security posture, and this rating reflects our deep dedication and effort. So foremost I would like to thank the team for its hard work in achieving this rating. I also want to assure our customers, partners, and end users that we will continue to apply the same level of discipline and effort to uphold these results with SecurityScorecard going forward,\u201d said Samuel Cure, AMI Chief Information Officer.<\/p>\n<p>We encourage OEMs, ODMs and our partners and customers to strongly consider a firmware vendor\u2019s security rating when selecting a partner for a system development project of any kind. Doing so will ensure that sensitive customer data and IP is safe and secure, and that products are designed and released in line with the best data safeguarding practices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One Truth (of Many) of The Information Age: Security Matters In a way, talking about information and data security is like talking about brushing one\u2019s teeth: we all know it is important, and exhibiting consistency and strong daily habits is essential to avoid catastrophic issues (and pain!) in the future. At AMI, as developers of [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":786,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"project_category":[1500],"project_tag":[1582,1580,1583],"class_list":["post-785","project","type-project","status-publish","has-post-thumbnail","hentry","project_category-news","project_tag-ami-trust-center","project_tag-cybersecurity","project_tag-securityscorecard","topics-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard - AMI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard\" \/>\n<meta property=\"og:description\" content=\"One Truth (of Many) of The Information Age: Security Matters In a way, talking about information and data security is like talking about brushing one\u2019s teeth: we all know it is important, and exhibiting consistency and strong daily habits is essential to avoid catastrophic issues (and pain!) in the future. At AMI, as developers of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/\" \/>\n<meta property=\"og:site_name\" content=\"AMI\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TheWorldRunsonAMI#\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-05T18:48:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"christinef\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AMI_PR\" \/>\n<meta name=\"twitter:site\" content=\"@AMI_PR\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"christinef\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/\"},\"author\":{\"name\":\"christinef\",\"@id\":\"https:\/\/www.ami.com\/#\/schema\/person\/fc3dd8265a9f8efc4841dd8f9cf418b8\"},\"headline\":\"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard\",\"datePublished\":\"2025-05-05T18:48:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/\"},\"wordCount\":589,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.ami.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/\",\"url\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/\",\"name\":\"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard - AMI\",\"isPartOf\":{\"@id\":\"https:\/\/www.ami.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg\",\"datePublished\":\"2025-05-05T18:48:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#primaryimage\",\"url\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg\",\"contentUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ami.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ami.com\/#website\",\"url\":\"https:\/\/www.ami.com\/\",\"name\":\"AMI\",\"description\":\"Trusted Leader in UEFI, BMC &amp; Open-Source Firmware\",\"publisher\":{\"@id\":\"https:\/\/www.ami.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ami.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ami.com\/#organization\",\"name\":\"AMI\",\"url\":\"https:\/\/www.ami.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ami.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png\",\"contentUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png\",\"width\":512,\"height\":512,\"caption\":\"AMI\"},\"image\":{\"@id\":\"https:\/\/www.ami.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TheWorldRunsonAMI#\",\"https:\/\/x.com\/AMI_PR\",\"https:\/\/www.linkedin.com\/company\/ami\",\"https:\/\/www.youtube.com\/c\/AMI_PR\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ami.com\/#\/schema\/person\/fc3dd8265a9f8efc4841dd8f9cf418b8\",\"name\":\"christinef\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ami.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/01f355d4a3cd8819e541466d7ac7a4b284dd638663bee12e7fd6f85f9ccb7ef3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/01f355d4a3cd8819e541466d7ac7a4b284dd638663bee12e7fd6f85f9ccb7ef3?s=96&d=mm&r=g\",\"caption\":\"christinef\"},\"url\":\"https:\/\/www.ami.com\/author\/christinef\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard - AMI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/","og_locale":"en_US","og_type":"article","og_title":"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard","og_description":"One Truth (of Many) of The Information Age: Security Matters In a way, talking about information and data security is like talking about brushing one\u2019s teeth: we all know it is important, and exhibiting consistency and strong daily habits is essential to avoid catastrophic issues (and pain!) in the future. At AMI, as developers of [&hellip;]","og_url":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/","og_site_name":"AMI","article_publisher":"https:\/\/www.facebook.com\/TheWorldRunsonAMI#","article_published_time":"2025-05-05T18:48:46+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg","type":"image\/jpeg"}],"author":"christinef","twitter_card":"summary_large_image","twitter_creator":"@AMI_PR","twitter_site":"@AMI_PR","twitter_misc":{"Written by":"christinef","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#article","isPartOf":{"@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/"},"author":{"name":"christinef","@id":"https:\/\/www.ami.com\/#\/schema\/person\/fc3dd8265a9f8efc4841dd8f9cf418b8"},"headline":"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard","datePublished":"2025-05-05T18:48:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/"},"wordCount":589,"commentCount":0,"publisher":{"@id":"https:\/\/www.ami.com\/#organization"},"image":{"@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/","url":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/","name":"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard - AMI","isPartOf":{"@id":"https:\/\/www.ami.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#primaryimage"},"image":{"@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg","datePublished":"2025-05-05T18:48:46+00:00","breadcrumb":{"@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#primaryimage","url":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg","contentUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/05\/AMI-Trust-Center_1200x628.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.ami.com\/ami-receives-a-grade-for-holistic-security-practices-by-securityscorecard\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ami.com\/"},{"@type":"ListItem","position":2,"name":"AMI Receives \u201cA\u201d Grade for Holistic Security Practices by SecurityScorecard"}]},{"@type":"WebSite","@id":"https:\/\/www.ami.com\/#website","url":"https:\/\/www.ami.com\/","name":"AMI","description":"Trusted Leader in UEFI, BMC &amp; Open-Source Firmware","publisher":{"@id":"https:\/\/www.ami.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ami.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ami.com\/#organization","name":"AMI","url":"https:\/\/www.ami.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ami.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png","contentUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png","width":512,"height":512,"caption":"AMI"},"image":{"@id":"https:\/\/www.ami.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TheWorldRunsonAMI#","https:\/\/x.com\/AMI_PR","https:\/\/www.linkedin.com\/company\/ami","https:\/\/www.youtube.com\/c\/AMI_PR"]},{"@type":"Person","@id":"https:\/\/www.ami.com\/#\/schema\/person\/fc3dd8265a9f8efc4841dd8f9cf418b8","name":"christinef","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ami.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/01f355d4a3cd8819e541466d7ac7a4b284dd638663bee12e7fd6f85f9ccb7ef3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/01f355d4a3cd8819e541466d7ac7a4b284dd638663bee12e7fd6f85f9ccb7ef3?s=96&d=mm&r=g","caption":"christinef"},"url":"https:\/\/www.ami.com\/author\/christinef\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project\/785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/types\/project"}],"author":[{"embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/comments?post=785"}],"version-history":[{"count":0,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project\/785\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/media\/786"}],"wp:attachment":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/media?parent=785"}],"wp:term":[{"taxonomy":"project_category","embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project_category?post=785"},{"taxonomy":"project_tag","embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project_tag?post=785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}