{"id":530158,"date":"2024-12-13T21:37:00","date_gmt":"2024-12-13T21:37:00","guid":{"rendered":"https:\/\/www.capgemini.com\/au-en\/?post_type=research-and-insight&#038;p=530158"},"modified":"2025-03-24T17:41:25","modified_gmt":"2025-03-24T17:41:25","slug":"generative-ai-and-cybersecurity-a-revisited-classic","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","title":{"rendered":"Generative AI and Cybersecurity: A revisited classic"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybersecurity<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">Generative AI and Cybersecurity: A<br>revisited classic<\/h1><\/div><div class=\"inner-row-insight download-btn\"><div class=\"col-md-4 downloadFiles addPadding\"><a class=\"button-download--small\" type=\"download\" href=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/03\/Gen-Ai-and-Cybersecurity-POV-2024b.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><span>Download PoV<\/span><span class=\"type\">2 MB  pdf<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1081284\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1081284\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-security-does-not-have-to-be-a-barrier-to-tapping-into-generative-ai-s-power-when-done-well-it-can-accelerate-value-creation\">Security does not have to be a barrier to tapping into generative AI\u2019s power. When done well, it can accelerate value creation.<\/h2>\n\n\n\n<p>Integrating generative AI (Gen AI) into business environments involves addressing critical needs for robust data security, ethical considerations, and effective risk management. It\u2019s essential to protect sensitive information, ensure compliance with regulations, and maintain the integrity of AI models to prevent issues like data leaks, biased outcomes, and model hallucinations. Governance frameworks, secure infrastructure, and continuous monitoring play vital roles in mitigating these risks. A balanced approach is necessary to harness the potential of Gen AI while safeguarding against its inherent challenges.<\/p>\n\n\n\n<p>The PoV covers the challenges and strategies for securely integrating Gen AI into business operations, emphasizing data protection, ethical considerations, risk management, and regulatory compliance.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-key-takeaways\">Key takeaways<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data protection<\/strong>: Learn how to safeguard your data against leaks and unauthorized access.<\/li>\n\n\n\n<li><strong>Risk management<\/strong>: Understand the importance of governance and risk frameworks.<\/li>\n\n\n\n<li><strong>Model integrity<\/strong>: Discover strategies to ensure the trustworthiness of AI outputs.<\/li>\n\n\n\n<li><strong>Infrastructure security<\/strong>: Get insights into securing your AI applications and infrastructure.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/02\/Gen-Ai-and-Cybersecurity-POV-2024b.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download the PoV<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-capgemini-s-ai-and-cybersecurity-experience\">Capgemini\u2019s AI and cybersecurity experience<\/h2>\n\n\n\n<p>At Capgemini, we combine our expertise in AI and cybersecurity to help you navigate the complexities of Gen AI. Our solutions are designed to accelerate innovation while ensuring robust security and compliance. Our experts and partners deliver advice, systems, tools, and operations to help you achieve the promise of Gen AI quickly and securely.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":440,"featured_media":530159,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"0504e8b2-ff84-42c1-a65c-48c0609b6942\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":73,"primary_term":"Cybersecurity","featured_focal_points":""},"tags":[],"research-and-insight-type":[71],"theme":[73],"brand":[],"service":[],"industry":[],"partners":[],"content-group":[],"class_list":["post-530158","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","research-and-insight-type-point-of-view","theme-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Generative AI and Cybersecurity: A revisited classic - Capgemini Australia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Generative AI and Cybersecurity: A revisited classic\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Australia\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T17:41:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\",\"name\":\"Generative AI and Cybersecurity: A revisited classic - Capgemini Australia\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg\",\"datePublished\":\"2024-12-13T21:37:00+00:00\",\"dateModified\":\"2025-03-24T17:41:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg\",\"width\":2881,\"height\":1801,\"caption\":\"genai-cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/au-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/au-en\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Generative AI and Cybersecurity: A revisited classic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/\",\"name\":\"Capgemini Australia\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/au-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Generative AI and Cybersecurity: A revisited classic - Capgemini Australia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","og_locale":"en_US","og_type":"article","og_title":"Generative AI and Cybersecurity: A revisited classic","og_url":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","og_site_name":"Capgemini Australia","article_modified_time":"2025-03-24T17:41:25+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","url":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","name":"Generative AI and Cybersecurity: A revisited classic - Capgemini Australia","isPartOf":{"@id":"https:\/\/www.capgemini.com\/au-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","datePublished":"2024-12-13T21:37:00+00:00","dateModified":"2025-03-24T17:41:25+00:00","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage","url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","contentUrl":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","width":2881,"height":1801,"caption":"genai-cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/au-en\/"},{"@type":"ListItem","position":2,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/au-en\/research-and-insight\/"},{"@type":"ListItem","position":3,"name":"Generative AI and Cybersecurity: A revisited classic"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/au-en\/#website","url":"https:\/\/www.capgemini.com\/au-en\/","name":"Capgemini Australia","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/au-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"theme_term_info":[{"id":73,"name":"Cybersecurity"}],"industry_term_info":[],"services_term_info":[],"partners_term_info":[],"brand_term_info":[],"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Generative AI and Cybersecurity: A revisited classic","url":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Australia","logo":""},"keywords":[],"dateCreated":"2024-12-13T21:37:00Z","datePublished":"2024-12-13T21:37:00Z","dateModified":"2025-03-24T17:41:25Z"},"rendered":"<meta name=\"parsely-title\" content=\"Generative AI and Cybersecurity: A revisited classic\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-12-13T21:37:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","featured_image_alt":"genai-cybersecurity","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Australia","distributor_original_site_url":"https:\/\/www.capgemini.com\/au-en","push-errors":false,"tag_names":[],"featured_image_url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/01\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight\/530158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/users\/440"}],"version-history":[{"count":5,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight\/530158\/revisions"}],"predecessor-version":[{"id":538349,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight\/530158\/revisions\/538349"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/media\/530159"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/media?parent=530158"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/tags?post=530158"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight-type?post=530158"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/theme?post=530158"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/brand?post=530158"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/service?post=530158"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/industry?post=530158"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/partners?post=530158"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/content-group?post=530158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}