{"id":678525,"date":"2025-01-14T11:19:00","date_gmt":"2025-01-14T11:19:00","guid":{"rendered":"https:\/\/www.capgemini.com\/gb-en\/?post_type=research-and-insight&#038;p=678525"},"modified":"2026-01-22T07:48:05","modified_gmt":"2026-01-22T07:48:05","slug":"ai-powered-cybersecurity-for-telecom","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/","title":{"rendered":"AI-powered cybersecurity for telecom"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:49% 70%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybersecurity<\/span><\/div><\/div><div class=\"brandInfo\"><div class=\"brandLogo\"><img decoding=\"async\" loading=\"lazy\" src=\"\/wp-content\/themes\/capgemini2020\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\"\/><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">AI-powered cybersecurity for telecom<\/h1><\/div><h2 class=\"reasearchInsightTitle\">Report from the Capgemini Research Institute<\/h2><div class=\"inner-row-insight download-btn\"><div class=\"col-md-4 downloadFiles addPadding\"><a class=\"button-download--small\" type=\"download\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><span>Download the report<\/span><span class=\"type\">3 MB  pdf<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1087846\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1087846\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h3 class=\"wp-block-heading\" id=\"h-with-the-continued-rollout-of-5g-networks-the-expansion-of-digital-services-and-the-widespread-adoption-of-cloud-computing-telecom-organisations-have-experienced-a-sharp-rise-in-cybersecurity-breaches-in-recent-years\">With the continued rollout of 5G networks, the expansion of digital services, and the widespread adoption of cloud computing, telecom organisations have experienced a sharp rise in cybersecurity breaches in recent years.<\/h3>\n\n\n\n<p>Our research indicates that cybersecurity breaches in telecom organisations have increased from 46% in 2021, to 86% by 2023. Threat actors use Artificial Intelligence (AI) and Generative AI (Gen AI) for more sophisticated attacks, including malware creation, social engineering, and phishing.\u00a0Organisations, therefore, must contend with an expanded attack surface due to risks such as prompt injection, vulnerabilities in AI-integrated applications, shadow AI, and internal misuse. Further, the entire lifecycle of Gen AI solutions \u2014from enterprise data collection and model customisation to development and maintenance \u2014must be secured.<\/p>\n\n\n\n<p>One promising solution to combat these security challenges is the integration of AI and Gen AI into telecom cybersecurity strategies. By leveraging AI technologies, telecom companies can enhance their ability to detect, prevent, and respond to potential threats in real time.<\/p>\n\n\n\n<p>To gain a deeper understanding of how telecom companies are using AI and Gen AI to address these rising cybersecurity risks, download our latest report <strong><em>New Defences, New Threats: What AI and Gen AI Bring to Cybersecurity<\/em><\/strong>.<\/p>\n\n\n\n<p>This cross-sector report brings you insights from a survey of 1,000 organisations and includes a <strong>telecom-specific section [page 28 onward]<\/strong> encompassing exclusive information and statistics, real-world telecom use cases and valuable perspectives for organisations looking to bolster their cybersecurity strategies amid the transition.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":257,"featured_media":678526,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"c65707a1-d6ac-4df8-8ce7-496f6ffb58c4\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"3289320e-26e3-4566-b0d5-476517bc955f\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":48,"primary_term":"Cybersecurity","featured_focal_points":""},"tags":[],"research-and-insight-type":[472],"theme":[48],"brand":[513],"service":[],"industry":[97],"partners":[],"content-group":[],"class_list":["post-678525","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","research-and-insight-type-capgemini-research-institute","theme-cybersecurity","brand-capgemini-research-institute","industry-telecoms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI-powered cybersecurity for telecom - Capgemini UK<\/title>\n<meta name=\"description\" content=\"With the continued rollout of 5G networks, the expansion of digital services, and the widespread adoption of cloud computing, telecom organizations have experienced a sharp rise in cybersecurity breaches in recent years.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-powered cybersecurity for telecom\" \/>\n<meta property=\"og:description\" content=\"With the continued rollout of 5G networks, the expansion of digital services, and the widespread adoption of cloud computing, telecom organizations have experienced a sharp rise in cybersecurity breaches in recent years.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini UK\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T07:48:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/\",\"name\":\"AI-powered cybersecurity for telecom - Capgemini UK\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg\",\"datePublished\":\"2025-01-14T11:19:00+00:00\",\"dateModified\":\"2026-01-22T07:48:05+00:00\",\"description\":\"With the continued rollout of 5G networks, the expansion of digital services, and the widespread adoption of cloud computing, telecom organizations have experienced a sharp rise in cybersecurity breaches in recent years.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg\",\"width\":2880,\"height\":1880},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/gb-en\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI-powered cybersecurity for telecom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/\",\"name\":\"Capgemini UK\",\"description\":\"Get the future you want\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/gb-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI-powered cybersecurity for telecom - Capgemini UK","description":"With the continued rollout of 5G networks, the expansion of digital services, and the widespread adoption of cloud computing, telecom organizations have experienced a sharp rise in cybersecurity breaches in recent years.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/","og_locale":"en_GB","og_type":"article","og_title":"AI-powered cybersecurity for telecom","og_description":"With the continued rollout of 5G networks, the expansion of digital services, and the widespread adoption of cloud computing, telecom organizations have experienced a sharp rise in cybersecurity breaches in recent years.","og_url":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/","og_site_name":"Capgemini UK","article_modified_time":"2026-01-22T07:48:05+00:00","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/","url":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/","name":"AI-powered cybersecurity for telecom - Capgemini UK","isPartOf":{"@id":"https:\/\/www.capgemini.com\/gb-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg","datePublished":"2025-01-14T11:19:00+00:00","dateModified":"2026-01-22T07:48:05+00:00","description":"With the continued rollout of 5G networks, the expansion of digital services, and the widespread adoption of cloud computing, telecom organizations have experienced a sharp rise in cybersecurity breaches in recent years.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#primaryimage","url":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg","contentUrl":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg","width":2880,"height":1880},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/gb-en\/research-and-insight\/"},{"@type":"ListItem","position":2,"name":"AI-powered cybersecurity for telecom"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/gb-en\/#website","url":"https:\/\/www.capgemini.com\/gb-en\/","name":"Capgemini UK","description":"Get the future you want","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/gb-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"theme_term_info":[{"id":48,"name":"Cybersecurity"}],"industry_term_info":[{"id":97,"name":"Telecoms"}],"services_term_info":[],"partners_term_info":[],"brand_term_info":[{"id":513,"name":"Capgemini Research Institute","slug":"capgemini-research-institute"}],"brand_term":[{"id":513,"slug":"capgemini-research-institute"}],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"AI-powered cybersecurity for telecom","url":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini UK","logo":""},"keywords":[],"dateCreated":"2025-01-14T11:19:00Z","datePublished":"2025-01-14T11:19:00Z","dateModified":"2026-01-22T07:48:05Z"},"rendered":"<meta name=\"parsely-title\" content=\"AI-powered cybersecurity for telecom\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-01-14T11:19:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini UK","distributor_original_site_url":"https:\/\/www.capgemini.com\/gb-en","push-errors":false,"tag_names":[],"featured_image_url":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/01\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight\/678525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/users\/257"}],"version-history":[{"count":1,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight\/678525\/revisions"}],"predecessor-version":[{"id":678528,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight\/678525\/revisions\/678528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/media\/678526"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/media?parent=678525"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/tags?post=678525"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight-type?post=678525"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/theme?post=678525"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/brand?post=678525"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/service?post=678525"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/industry?post=678525"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/partners?post=678525"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/content-group?post=678525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}