{"id":62,"date":"2024-11-04T11:19:41","date_gmt":"2024-11-04T11:19:41","guid":{"rendered":"https:\/\/nexivis.ai\/?p=62"},"modified":"2024-11-04T11:19:43","modified_gmt":"2024-11-04T11:19:43","slug":"nis2-understanding-and-implementing-the-new-eu-cybersecurity-directive","status":"publish","type":"post","link":"https:\/\/nexivis.ai\/en\/blog\/wiki\/nis2-understanding-and-implementing-the-new-eu-cybersecurity-directive\/","title":{"rendered":"NIS2: Understanding and implementing the new EU Cybersecurity Directive"},"content":{"rendered":"<p>In an increasingly digitalized world, cyber security is becoming ever more important. The European Union has responded to this by adopting the NIS2 Directive (Network and Information System Security 2). But what does this mean in concrete terms for companies and how can they meet the new requirements? This article provides an overview and practical insights.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is NIS2?<\/strong><\/h2>\n\n\n\n<p>NIS2 is the successor to the original NIS Directive from 2016 and was developed to take cybersecurity in the EU to a new level. The directive significantly expands the scope and places stricter requirements on companies and organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Main objectives of NIS2<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Strengthening cybersecurity in the EU<\/li>\n\n\n\n<li>Improving the resilience of critical infrastructures<\/li>\n\n\n\n<li>Harmonization of cybersecurity standards in all EU member states<\/li>\n\n\n\n<li>Promoting a culture of risk management<\/li>\n\n\n\n<li>Improving the exchange of information between Member States<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Who is affected?<\/strong><\/h2>\n\n\n\n<p>NIS2 significantly expands the group of affected companies. In addition to critical infrastructures such as energy, transport and healthcare, sectors such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Digital infrastructure (e.g. cloud providers, data centers)<\/li>\n\n\n\n<li>Public administration<\/li>\n\n\n\n<li>Space travel<\/li>\n\n\n\n<li>Postal services<\/li>\n\n\n\n<li>Waste management<\/li>\n\n\n\n<li>Chemical industry<\/li>\n\n\n\n<li>Food production<\/li>\n<\/ul>\n\n\n\n<p>under the directive. The size of the company also plays a role: medium-sized and large companies in these sectors must meet the NIS2 requirements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Technical requirements<\/strong><\/h2>\n\n\n\n<p>NIS2 places specific technical requirements on the companies concerned:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Risk management<\/strong>Implementation of comprehensive cybersecurity risk management<\/li>\n\n\n\n<li><strong>Incident Reporting<\/strong>Reporting cyber security incidents within 24 hours<\/li>\n\n\n\n<li><strong>Supply Chain Security<\/strong>Ensuring cyber security throughout the supply chain<\/li>\n\n\n\n<li><strong>Encryption<\/strong>Use of strong encryption technologies<\/li>\n\n\n\n<li><strong>Access controls<\/strong>Implementation of strict authentication mechanisms<\/li>\n\n\n\n<li><strong>Network segmentation<\/strong>Separation of critical systems from the Internet and other network areas<\/li>\n\n\n\n<li><strong>Patch management<\/strong>Regular and timely updating of systems and software<\/li>\n\n\n\n<li><strong>Backup and disaster recovery<\/strong>: Regular backups and disaster recovery plans<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Solutions and examples<\/strong><\/h2>\n\n\n\n<p>To meet the NIS2 requirements, companies can take the following measures:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Implementing a risk management framework<\/strong><br>Example: Introduction of the NIST Cybersecurity Framework, which helps organizations identify, protect, detect, respond to and recover from risks.<\/li>\n\n\n\n<li><strong>Introducing Security Information and Event Management (SIEM)<\/strong><br>Example: Implementation of Splunk or IBM QRadar for real-time monitoring and analysis of security events.<\/li>\n\n\n\n<li><strong>Use multi-factor authentication (MFA)<\/strong><br>Example: Use of Google Authenticator or Microsoft Authenticator for an additional layer of security when logging in.<\/li>\n\n\n\n<li><strong>Strengthen encryption<\/strong><br>Example: Use of AES-256 for data encryption and implementation of TLS 1.3 for secure communication.<\/li>\n\n\n\n<li><strong>Implement network segmentation<\/strong><br>Example: Use of VLANs or micro-segmentation with technologies such as VMware NSX to isolate critical systems.<\/li>\n\n\n\n<li><strong>Automated patch management<\/strong><br>Example: Use of tools such as Microsoft SCCM or Ansible for the automated distribution and installation of security updates.<\/li>\n\n\n\n<li><strong>Supply Chain Risk Management<\/strong><br>Example: Carrying out regular security audits of suppliers and integrating security requirements into contracts.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Timetable for implementation<\/strong><\/h2>\n\n\n\n<p>The EU member states have until October 2025 to transpose the NIS2 Directive into national law. However, companies should start preparing now in order to be compliant in time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>The NIS2 directive presents companies with new challenges, but also offers them the opportunity to improve their own cyber security in the long term. By implementing robust security measures, companies can not only comply with legal requirements, but also strengthen their resilience to cyberattacks and strengthen the trust of their customers.NIS2 implementation requires investment and resources, but in the face of increasing threats from cybercrime, it is a necessary step towards securing Europe's digital future.<\/p>\n\n\n\n<p>#nis 2 directive #implementation of nis2 #network and information security #information security #area of application #information security #information sharing #cyberthreats #security levels<\/p>","protected":false},"excerpt":{"rendered":"<p>In einer zunehmend digitalisierten Welt wird Cybersicherheit immer wichtiger. Die Europ\u00e4ische Union hat darauf mit der Verabschiedung der NIS2-Richtlinie (Netzwerk- und Informationssystemsicherheit 2) reagiert. Aber was bedeutet das konkret f\u00fcr Unternehmen und wie k\u00f6nnen sie die neuen Anforderungen erf\u00fcllen? Dieser Artikel gibt einen \u00dcberblick und praktische Einblicke. Was ist NIS2? NIS2 ist die Nachfolgerin der [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":63,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-62","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.4 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIS2: Die neue EU-Cybersicherheitsrichtlinie verstehen und umsetzen - Nexivis<\/title>\n<meta name=\"description\" content=\"Erfahren Sie alles \u00fcber die NIS2-Richtlinie der EU, die neue Standards f\u00fcr Cybersicherheit in kritischen Sektoren setzt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nexivis.ai\/en\/blog\/wiki\/nis2-understanding-and-implementing-the-new-eu-cybersecurity-directive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2: Die neue EU-Cybersicherheitsrichtlinie verstehen und umsetzen\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie alles \u00fcber die NIS2-Richtlinie der EU, die neue Standards f\u00fcr Cybersicherheit in kritischen Sektoren setzt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nexivis.ai\/en\/blog\/wiki\/nis2-understanding-and-implementing-the-new-eu-cybersecurity-directive\/\" \/>\n<meta property=\"og:site_name\" content=\"Nexivis\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-04T11:19:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-04T11:19:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1571\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/nexivis.ai\/#\/schema\/person\/f5d88018a19e0cbf6cc207f41dec658d\"},\"headline\":\"NIS2: Die neue EU-Cybersicherheitsrichtlinie verstehen und umsetzen\",\"datePublished\":\"2024-11-04T11:19:41+00:00\",\"dateModified\":\"2024-11-04T11:19:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/\"},\"wordCount\":565,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/nexivis.ai\/#organization\"},\"image\":{\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg\",\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/\",\"url\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/\",\"name\":\"NIS2: Die neue EU-Cybersicherheitsrichtlinie verstehen und umsetzen - Nexivis\",\"isPartOf\":{\"@id\":\"https:\/\/nexivis.ai\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg\",\"datePublished\":\"2024-11-04T11:19:41+00:00\",\"dateModified\":\"2024-11-04T11:19:43+00:00\",\"description\":\"Erfahren Sie alles \u00fcber die NIS2-Richtlinie der EU, die neue Standards f\u00fcr Cybersicherheit in kritischen Sektoren setzt.\",\"breadcrumb\":{\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#primaryimage\",\"url\":\"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg\",\"contentUrl\":\"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg\",\"width\":1571,\"height\":667,\"caption\":\"Cyber security, data protection concept, person using computer with privacy security and encryption, secure internet access. Cybersecurity technology and cybernetics, virtual digital padlock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/nexivis.ai\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2: Die neue EU-Cybersicherheitsrichtlinie verstehen und umsetzen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nexivis.ai\/#website\",\"url\":\"https:\/\/nexivis.ai\/\",\"name\":\"Nexivis\",\"description\":\"Eine andere WordPress-Site.\",\"publisher\":{\"@id\":\"https:\/\/nexivis.ai\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nexivis.ai\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nexivis.ai\/#organization\",\"name\":\"Nexivis\",\"url\":\"https:\/\/nexivis.ai\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexivis.ai\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/10\/logo-nexivis.webp\",\"contentUrl\":\"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/10\/logo-nexivis.webp\",\"width\":512,\"height\":512,\"caption\":\"Nexivis\"},\"image\":{\"@id\":\"https:\/\/nexivis.ai\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/nexivis.ai\/#\/schema\/person\/f5d88018a19e0cbf6cc207f41dec658d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexivis.ai\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e13984381cd5672f9496bbd6db875bf3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e13984381cd5672f9496bbd6db875bf3?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/nexivis.ai\"],\"url\":\"https:\/\/nexivis.ai\/en\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIS2: Understanding and implementing the new EU Cybersecurity Directive - Nexivis","description":"Find out all about the EU's NIS2 Directive, which sets new standards for cyber security in critical sectors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nexivis.ai\/en\/blog\/wiki\/nis2-understanding-and-implementing-the-new-eu-cybersecurity-directive\/","og_locale":"en_US","og_type":"article","og_title":"NIS2: Die neue EU-Cybersicherheitsrichtlinie verstehen und umsetzen","og_description":"Erfahren Sie alles \u00fcber die NIS2-Richtlinie der EU, die neue Standards f\u00fcr Cybersicherheit in kritischen Sektoren setzt.","og_url":"https:\/\/nexivis.ai\/en\/blog\/wiki\/nis2-understanding-and-implementing-the-new-eu-cybersecurity-directive\/","og_site_name":"Nexivis","article_published_time":"2024-11-04T11:19:41+00:00","article_modified_time":"2024-11-04T11:19:43+00:00","og_image":[{"width":1571,"height":667,"url":"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#article","isPartOf":{"@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/"},"author":{"name":"admin","@id":"https:\/\/nexivis.ai\/#\/schema\/person\/f5d88018a19e0cbf6cc207f41dec658d"},"headline":"NIS2: Die neue EU-Cybersicherheitsrichtlinie verstehen und umsetzen","datePublished":"2024-11-04T11:19:41+00:00","dateModified":"2024-11-04T11:19:43+00:00","mainEntityOfPage":{"@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/"},"wordCount":565,"commentCount":0,"publisher":{"@id":"https:\/\/nexivis.ai\/#organization"},"image":{"@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#primaryimage"},"thumbnailUrl":"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg","articleSection":["Wiki"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/","url":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/","name":"NIS2: Understanding and implementing the new EU Cybersecurity Directive - Nexivis","isPartOf":{"@id":"https:\/\/nexivis.ai\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#primaryimage"},"image":{"@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#primaryimage"},"thumbnailUrl":"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg","datePublished":"2024-11-04T11:19:41+00:00","dateModified":"2024-11-04T11:19:43+00:00","description":"Find out all about the EU's NIS2 Directive, which sets new standards for cyber security in critical sectors.","breadcrumb":{"@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#primaryimage","url":"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg","contentUrl":"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/11\/iStock-1499383518.jpg","width":1571,"height":667,"caption":"Cyber security, data protection concept, person using computer with privacy security and encryption, secure internet access. Cybersecurity technology and cybernetics, virtual digital padlock"},{"@type":"BreadcrumbList","@id":"https:\/\/nexivis.ai\/blog\/wiki\/nis2-die-neue-eu-cybersicherheitsrichtlinie-verstehen-und-umsetzen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/nexivis.ai\/"},{"@type":"ListItem","position":2,"name":"NIS2: Die neue EU-Cybersicherheitsrichtlinie verstehen und umsetzen"}]},{"@type":"WebSite","@id":"https:\/\/nexivis.ai\/#website","url":"https:\/\/nexivis.ai\/","name":"Nexivis","description":"Another WordPress site.","publisher":{"@id":"https:\/\/nexivis.ai\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nexivis.ai\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nexivis.ai\/#organization","name":"Nexivis","url":"https:\/\/nexivis.ai\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexivis.ai\/#\/schema\/logo\/image\/","url":"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/10\/logo-nexivis.webp","contentUrl":"https:\/\/nexivis.ai\/wp-content\/uploads\/2024\/10\/logo-nexivis.webp","width":512,"height":512,"caption":"Nexivis"},"image":{"@id":"https:\/\/nexivis.ai\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nexivis.ai\/#\/schema\/person\/f5d88018a19e0cbf6cc207f41dec658d","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexivis.ai\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e13984381cd5672f9496bbd6db875bf3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e13984381cd5672f9496bbd6db875bf3?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nexivis.ai"],"url":"https:\/\/nexivis.ai\/en\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/posts\/62","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":0,"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/posts\/62\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/media\/63"}],"wp:attachment":[{"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/media?parent=62"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/categories?post=62"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nexivis.ai\/en\/wp-json\/wp\/v2\/tags?post=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}