{"id":129253,"date":"2025-02-10T06:13:19","date_gmt":"2025-02-10T12:13:19","guid":{"rendered":"https:\/\/www.controleng.com\/?p=129253"},"modified":"2025-02-10T06:17:17","modified_gmt":"2025-02-10T12:17:17","slug":"study-highlights-need-for-cybersecurity-focus-on-devices-in-2025","status":"publish","type":"post","link":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/","title":{"rendered":"Study highlights need for cybersecurity focus on devices in 2025"},"content":{"rendered":"\n<p>The German Federal Office for Information Security (BSI) has found that over 2,000 new vulnerabilities are discovered in software each month on average, with around 15% classified as &#8216;critical&#8217;. &#8220;In view of this constant threat situation, German industry should further strengthen its cyber resilience in 2025,&#8221; advised Jan Wendenburg, CEO of the Duesseldorf-based cybersecurity company\u00a0<a href=\"https:\/\/www.onekey.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ONEKEY<\/a>. Referring to the company&#8217;s &#8220;OT+IoT Cybersecurity Report 2024,&#8221; he noted that the industry did not prioritize software security in networked devices, machines and systems last year. &#8220;The industry has a lot of catching up to do in this area in 2025 compared to last year,&#8221; said Jan Wendenburg. The <a href=\"https:\/\/www.onekey.com\/resource\/ot-iot-cybersecurity-report-2024\" target=\"_blank\" rel=\"noreferrer noopener\">report on security in operational technology (OT) and Internet of Things (IoT) devices<\/a> is based on a survey of 300 industry executives.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt-1024x576.jpg\" alt=\"\" class=\"wp-image-129254\" srcset=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt-1024x576.jpg 1024w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt-300x169.jpg 300w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt-768x432.jpg 768w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt-900x506.jpg 900w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt-400x225.jpg 400w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">ONEKEY report emphasizes cybersecurity priorities for devices in 2025. \nCourtesy: Control Engineering, using information from ONEKEY<\/figcaption><\/figure>\n\n\n\n<p>The study reveals that about two-thirds of companies surveyed recognize a need to enhance cybersecurity measures. One-third of respondents view the budget for defending against hackers as insufficient, highlighting a need for increased focus in this area. Additionally, 27% of companies are unsure about the budget allocation for cybersecurity measures. Only 34% report having what they consider to be a sufficient or substantial budget for cybersecurity initiatives. &#8220;The other two-thirds should clarify their IT security budget in the new year and increase it quickly,&#8221; ONEKEY CEO Jan Wendenburg recommended for 2025.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common Measures Companies Use to Test Cyber Resilience<\/h2>\n\n\n\n<p>As part of the survey, ONEKEY sought to understand the measures companies use to test their cyber resilience. According to the survey, 36% conduct threat assessments, 23% initiate penetration tests, 22% use intrusion detection systems for active network monitoring, and 15% carry out vulnerability assessments (multiple answers were allowed). Additionally, 19% enhance security through network segmentation, ensuring that an intrusion in one segment does not affect the entire corporate network.<\/p>\n\n\n\n<p>According to the survey, the most commonly used measure against cybercriminals was not technical protection, but legal protection: 38% of companies require their IT service providers and suppliers to contractually guarantee security. The effectiveness of this approach is uncertain, as suppliers with \u2018contractually assured security\u2019 have been linked to several security incidents in recent years, including those involving companies like Cloudflare, Crowdstrike, and Cisco.<\/p>\n\n\n\n<p>Additionally, about 32% of surveyed companies surveyed have established processes to analyze security incidents and implement improvements. &#8220;Pre-defined business processes that define how to deal with hacking attacks, both during and after an attack, should be part of every company&#8217;s security repertoire,&#8221; said Jan Wendenburg. He explained: &#8220;In view of the ongoing threat situation, every company management should be adequately prepared for the worst-case scenario.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Jan Wendenburg: &#8220;Cyber Resilience Should Top the 2025 Agenda.&#8221;<\/h2>\n\n\n\n<p>Just over a third (34%) of organizations take steps to improve security after a hacking incident. According to the survey, these companies analyze and evaluate the security incidents they experience and implement improvements to strengthen their cybersecurity measures. However, the \u201cOT+IoT Cybersecurity Report\u201d reveals that a similar number of organizations struggle to respond effectively to cyberattacks. Many lack adequate strategies for addressing attacks on connected devices, machines, and systems. 16% have not developed operational procedures to learn from cyberattacks and implement necessary improvements.<\/p>\n\n\n\n<p>&#8220;Business leaders should put cyber resilience at the top of their agenda for 2025,&#8221; recommended Jan Wendenburg.<\/p>\n\n\n\n<p>Edited by Puja Mitra, WTWH Media, for <em>Control Engineering<\/em>, from an <a href=\"https:\/\/www.onekey.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ONEKEY<\/a> news release.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ONEKEY&#8217;s &#8216;OT+IoT Cybersecurity Report 2024&#8217; notes limited focus on software security in devices.<\/p>\n","protected":false},"author":45,"featured_media":129254,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[104076],"tags":[109340,109809,109810],"tracking-metrics":[],"display-location":[],"class_list":{"2":"type-post"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Study highlights need for cybersecurity focus on devices in 2025 - Control Engineering<\/title>\n<meta name=\"description\" content=\"ONEKEY&#039;s &quot;OT+IoT Cybersecurity Report 2024&quot; notes limited focus on software security in devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Study highlights need for cybersecurity focus on devices in 2025 - Control Engineering\" \/>\n<meta property=\"og:description\" content=\"ONEKEY&#039;s &quot;OT+IoT Cybersecurity Report 2024&quot; notes limited focus on software security in devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Engineering\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-10T12:13:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-10T12:17:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Puja Mitra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:site\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Puja Mitra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/\"},\"author\":{\"name\":\"Puja Mitra\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/c00fa32373d4bd4e66d414b2bc7aed23\"},\"headline\":\"Study highlights need for cybersecurity focus on devices in 2025\",\"datePublished\":\"2025-02-10T12:13:19+00:00\",\"dateModified\":\"2025-02-10T12:17:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/\"},\"wordCount\":556,\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg\",\"keywords\":[\"control engineering\",\"cybersecurity\",\"IoT\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/\",\"url\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/\",\"name\":\"Study highlights need for cybersecurity focus on devices in 2025 - Control Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg\",\"datePublished\":\"2025-02-10T12:13:19+00:00\",\"dateModified\":\"2025-02-10T12:17:17+00:00\",\"description\":\"ONEKEY's \\\"OT+IoT Cybersecurity Report 2024\\\" notes limited focus on software security in devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#primaryimage\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg\",\"width\":1280,\"height\":720,\"caption\":\"ONEKEY report emphasizes cybersecurity priorities for devices in 2025. Courtesy: Control Engineering, using information from ONEKEY\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.controleng.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Study highlights need for cybersecurity focus on devices in 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.controleng.com\/#website\",\"url\":\"https:\/\/www.controleng.com\/\",\"name\":\"Control Engineering\",\"description\":\"Control Engineering covers and educates about automation, control and instrumentation technologies\",\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.controleng.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.controleng.com\/#organization\",\"name\":\"Control Engineering\",\"url\":\"https:\/\/www.controleng.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"width\":300,\"height\":93,\"caption\":\"Control Engineering\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\",\"https:\/\/x.com\/controlengtips\",\"https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/c00fa32373d4bd4e66d414b2bc7aed23\",\"name\":\"Puja Mitra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8dff1f7ef00035e387fbb65810bdd4c816853dea0414d2a0185a47e69943ed29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8dff1f7ef00035e387fbb65810bdd4c816853dea0414d2a0185a47e69943ed29?s=96&d=mm&r=g\",\"caption\":\"Puja Mitra\"},\"description\":\"Puja Mitra holds an MBA in marketing and human resources and a master\u2019s degree in economics. She is a managing editor with more than 12 years of editing experience and has worked on content related to CAD, CAM, CAE, aerospace, 3D printing, BIM, manufacturing, digital transformation and computing. She has a particular interest in content development and technical writing.\",\"url\":\"https:\/\/www.controleng.com\/author\/pmitra\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Study highlights need for cybersecurity focus on devices in 2025 - Control Engineering","description":"ONEKEY's \"OT+IoT Cybersecurity Report 2024\" notes limited focus on software security in devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/","og_locale":"en_US","og_type":"article","og_title":"Study highlights need for cybersecurity focus on devices in 2025 - Control Engineering","og_description":"ONEKEY's \"OT+IoT Cybersecurity Report 2024\" notes limited focus on software security in devices.","og_url":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/","og_site_name":"Control Engineering","article_publisher":"https:\/\/www.facebook.com\/ControlEngineeringMagazine","article_published_time":"2025-02-10T12:13:19+00:00","article_modified_time":"2025-02-10T12:17:17+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg","type":"image\/jpeg"}],"author":"Puja Mitra","twitter_card":"summary_large_image","twitter_creator":"@controlengtips","twitter_site":"@controlengtips","twitter_misc":{"Written by":"Puja Mitra","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#article","isPartOf":{"@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/"},"author":{"name":"Puja Mitra","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/c00fa32373d4bd4e66d414b2bc7aed23"},"headline":"Study highlights need for cybersecurity focus on devices in 2025","datePublished":"2025-02-10T12:13:19+00:00","dateModified":"2025-02-10T12:17:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/"},"wordCount":556,"publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"image":{"@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg","keywords":["control engineering","cybersecurity","IoT"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/","url":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/","name":"Study highlights need for cybersecurity focus on devices in 2025 - Control Engineering","isPartOf":{"@id":"https:\/\/www.controleng.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg","datePublished":"2025-02-10T12:13:19+00:00","dateModified":"2025-02-10T12:17:17+00:00","description":"ONEKEY's \"OT+IoT Cybersecurity Report 2024\" notes limited focus on software security in devices.","breadcrumb":{"@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#primaryimage","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/create-image-ppt.jpg","width":1280,"height":720,"caption":"ONEKEY report emphasizes cybersecurity priorities for devices in 2025. Courtesy: Control Engineering, using information from ONEKEY"},{"@type":"BreadcrumbList","@id":"https:\/\/www.controleng.com\/study-highlights-need-for-cybersecurity-focus-on-devices-in-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.controleng.com\/"},{"@type":"ListItem","position":2,"name":"Study highlights need for cybersecurity focus on devices in 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.controleng.com\/#website","url":"https:\/\/www.controleng.com\/","name":"Control Engineering","description":"Control Engineering covers and educates about automation, control and instrumentation technologies","publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.controleng.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.controleng.com\/#organization","name":"Control Engineering","url":"https:\/\/www.controleng.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","width":300,"height":93,"caption":"Control Engineering"},"image":{"@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ControlEngineeringMagazine","https:\/\/x.com\/controlengtips","https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/"]},{"@type":"Person","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/c00fa32373d4bd4e66d414b2bc7aed23","name":"Puja Mitra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8dff1f7ef00035e387fbb65810bdd4c816853dea0414d2a0185a47e69943ed29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8dff1f7ef00035e387fbb65810bdd4c816853dea0414d2a0185a47e69943ed29?s=96&d=mm&r=g","caption":"Puja Mitra"},"description":"Puja Mitra holds an MBA in marketing and human resources and a master\u2019s degree in economics. She is a managing editor with more than 12 years of editing experience and has worked on content related to CAD, CAM, CAE, aerospace, 3D printing, BIM, manufacturing, digital transformation and computing. She has a particular interest in content development and technical writing.","url":"https:\/\/www.controleng.com\/author\/pmitra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/comments?post=129253"}],"version-history":[{"count":0,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129253\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media\/129254"}],"wp:attachment":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media?parent=129253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/categories?post=129253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tags?post=129253"},{"taxonomy":"tracking-metric","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tracking-metrics?post=129253"},{"taxonomy":"display-location","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/display-location?post=129253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}