{"id":31762,"date":"2026-04-21T16:19:29","date_gmt":"2026-04-21T14:19:29","guid":{"rendered":"https:\/\/devity.eu\/devity-blog-industrial-iot-security-architecture\/"},"modified":"2026-04-22T14:31:19","modified_gmt":"2026-04-22T12:31:19","slug":"devity-blog-industrial-iot-security-architecture","status":"publish","type":"page","link":"https:\/\/devity.eu\/en\/devity-blog-industrial-iot-security-architecture\/","title":{"rendered":"DEVITY Blog | Industrial IoT, Security &amp; Architecture"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"31762\" class=\"elementor elementor-31762 elementor-31708\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b3e153 e-flex e-con-boxed e-con e-parent\" data-id=\"0b3e153\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle-asymmetrical&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M738,99l262-93V0H0v5.6L738,99z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df5145a e-con-full e-flex e-con e-child\" data-id=\"df5145a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03d5a01 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"03d5a01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69eaffb4208f6\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > DEVITY Blog<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e8d924 e-con-full e-flex e-con e-child\" data-id=\"0e8d924\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65e35f3 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"65e35f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69eaffb421b56\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > Industrial IoT, security, and digital identity.\nPractical insights from architecture to operations.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b92a4b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b92a4b5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f5161b5\" data-id=\"f5161b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ad53d92 elementor-widget elementor-widget-ld_blog\" data-id=\"ad53d92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_blog.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-lp-grid ad53d92 blog-id-181747090 \"><div class=\"lqd-lp-grid-inner\" data-id=\"0\"><div class=\"lqd-lp-row row pos-rel d-flex flex-wrap\" ><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 it-security lqd-f-61\"><article id=\"post-31505\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-16 text-start post-31505 post type-post status-publish format-standard has-post-thumbnail hentry category-it-security\">\n\n<div class=\"lqd-lp-img border-radius-4 overflow-hidden pos-rel mb-5\">\n\t<figure class=\"pos-rel bg-cover bg-center w-100\"><img fetchpriority=\"high\" decoding=\"async\" width=\"720\" height=\"400\" src=\"https:\/\/devity.eu\/wp-content\/uploads\/2026\/03\/Digitale-Identita\u0308t-im-Industrial-IoT-\u2013-sichere-Gera\u0308tekommunikation-1-720x400.png\" class=\"w-100 wp-post-image\" alt=\"\" itemprop=\"image\" \/><\/figure><\/div>\n\n<header class=\"lqd-lp-header mb-3\">\n\t<h3 class=\"entry-title lqd-lp-title h5 m-0\"><a  href=\"https:\/\/devity.eu\/en\/what-is-a-digital-identity-in-industrial-iot-and-why-is-it-important\/\" rel=\"bookmark\">What is a digital identity in Industrial IoT and why is it important?<\/a><\/h3><\/header>\n\n\n\n<a  href=\"https:\/\/devity.eu\/en\/what-is-a-digital-identity-in-industrial-iot-and-why-is-it-important\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 it-security lqd-f-61 unkategorisiert lqd-f-1\"><article id=\"post-29263\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-16 text-start post-29263 post type-post status-publish format-standard has-post-thumbnail hentry category-it-security category-unkategorisiert\">\n\n<div class=\"lqd-lp-img border-radius-4 overflow-hidden pos-rel mb-5\">\n\t<figure class=\"pos-rel bg-cover bg-center w-100\"><img decoding=\"async\" width=\"720\" height=\"400\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 720 400&#039;%2F%3E\" class=\"w-100 ld-lazyload wp-post-image\" alt=\"\" itemprop=\"image\" data-src=\"https:\/\/devity.eu\/wp-content\/uploads\/2025\/01\/AdobeStock_603777425-1-720x400.jpeg\" data-aspect=\"1.8\" \/><\/figure><\/div>\n\n<header class=\"lqd-lp-header mb-3\">\n\t<h3 class=\"entry-title lqd-lp-title h5 m-0\"><a  href=\"https:\/\/devity.eu\/en\/integration-of-iot-devices-how-opc-ua-simplifies-and-secures-onboarding\/\" rel=\"bookmark\">Integration of IoT devices: How OPC UA simplifies and secures onboarding<\/a><\/h3><\/header>\n\n\n\n<a  href=\"https:\/\/devity.eu\/en\/integration-of-iot-devices-how-opc-ua-simplifies-and-secures-onboarding\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 it-security lqd-f-61 unkategorisiert lqd-f-1\"><article id=\"post-26701\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-16 text-start post-26701 post type-post status-publish format-standard has-post-thumbnail hentry category-it-security category-unkategorisiert\">\n\n<div class=\"lqd-lp-img border-radius-4 overflow-hidden pos-rel mb-5\">\n\t<figure class=\"pos-rel bg-cover bg-center w-100\"><img decoding=\"async\" width=\"720\" height=\"400\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 720 400&#039;%2F%3E\" class=\"w-100 ld-lazyload wp-post-image\" alt=\"\" itemprop=\"image\" data-src=\"https:\/\/devity.eu\/wp-content\/uploads\/2024\/07\/CyberRisikoCheck_Illustration-720x400.jpg\" data-aspect=\"1.8\" \/><\/figure><\/div>\n\n<header class=\"lqd-lp-header mb-3\">\n\t<h3 class=\"entry-title lqd-lp-title h5 m-0\"><a  href=\"https:\/\/devity.eu\/en\/it-security-solutions-for-small-businesses-the-cyberriskcheck\/\" rel=\"bookmark\">IT security solutions for small businesses: The CyberRiskCheck<\/a><\/h3><\/header>\n\n\n\n<a  href=\"https:\/\/devity.eu\/en\/it-security-solutions-for-small-businesses-the-cyberriskcheck\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 it-security lqd-f-61 unkategorisiert lqd-f-1\"><article id=\"post-26699\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-16 text-start post-26699 post type-post status-publish format-standard has-post-thumbnail hentry category-it-security category-unkategorisiert\">\n\n<div class=\"lqd-lp-img border-radius-4 overflow-hidden pos-rel mb-5\">\n\t<figure class=\"pos-rel bg-cover bg-center w-100\"><img loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"400\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 720 400&#039;%2F%3E\" class=\"w-100 ld-lazyload wp-post-image\" alt=\"\" itemprop=\"image\" data-src=\"https:\/\/devity.eu\/wp-content\/uploads\/2024\/06\/PKI_Security_Thumbnail-720x400.png\" data-aspect=\"1.8\" \/><\/figure><\/div>\n\n<header class=\"lqd-lp-header mb-3\">\n\t<h3 class=\"entry-title lqd-lp-title h5 m-0\"><a  href=\"https:\/\/devity.eu\/en\/the-invisible-threat-why-industrial-iot-security-needs-a-pki\/\" rel=\"bookmark\">The Invisible Threat: Why Industrial IoT Security Needs a PKI<\/a><\/h3><\/header>\n\n\n\n<a  href=\"https:\/\/devity.eu\/en\/the-invisible-threat-why-industrial-iot-security-needs-a-pki\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 it-security lqd-f-61 unkategorisiert lqd-f-1\"><article id=\"post-26697\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-16 text-start post-26697 post type-post status-publish format-standard has-post-thumbnail hentry category-it-security category-unkategorisiert\">\n\n<div class=\"lqd-lp-img border-radius-4 overflow-hidden pos-rel mb-5\">\n\t<figure class=\"pos-rel bg-cover bg-center w-100\"><img loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"400\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 720 400&#039;%2F%3E\" class=\"w-100 ld-lazyload wp-post-image\" alt=\"\" itemprop=\"image\" data-src=\"https:\/\/devity.eu\/wp-content\/uploads\/2024\/06\/Digitale_Identita\u0308ten-720x400.jpg\" data-aspect=\"1.8\" \/><\/figure><\/div>\n\n<header class=\"lqd-lp-header mb-3\">\n\t<h3 class=\"entry-title lqd-lp-title h5 m-0\"><a  href=\"https:\/\/devity.eu\/en\/security-and-trust-in-industry-4-0-the-role-of-digital-identities\/\" rel=\"bookmark\">Security and Trust in Industry 4.0: The Role of Digital Identities<\/a><\/h3><\/header>\n\n\n\n<a  href=\"https:\/\/devity.eu\/en\/security-and-trust-in-industry-4-0-the-role-of-digital-identities\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><\/div><!--\/ .row --><div class=\"hidden liquid-pf-nav ld-pf-nav-ajax\"><div class=\"page-nav text-center\"><nav aria-label=\"Page navigation\"><a href=\"javascript:void(0)\" data-args=\"{&quot;action&quot;:&quot;liquid_get_ajax_posts&quot;,&quot;posts_per_page&quot;:&quot;9&quot;,&quot;term_classes&quot;:&quot;it-security lqd-f-61 unkategorisiert lqd-f-1&quot;,&quot;style&quot;:&quot;style16&quot;,&quot;show_meta&quot;:&quot;yes&quot;,&quot;meta_type&quot;:&quot;cats&quot;,&quot;one_category&quot;:&quot;no&quot;,&quot;title_tag&quot;:&quot;h3&quot;,&quot;use_inheritance&quot;:&quot;&quot;,&quot;tag_to_inherite&quot;:null,&quot;grid_columns&quot;:&quot;3&quot;,&quot;enable_post_excerpt&quot;:&quot;no&quot;,&quot;post_excerpt_length&quot;:&quot;30&quot;,&quot;show_read_more_button&quot;:&quot;no&quot;,&quot;items_height&quot;:null}\" class=\"elementor-button btn ws-nowrap ld-ajax-loadmore ws-nowrap \"><span class=\"static d-block\">Load more<\/span><span class=\"loading d-block pos-abs\"><span class=\"dots d-block\"><span class=\"d-inline-block\"><\/span><span class=\"d-inline-block\"><\/span><span class=\"d-inline-block\"><\/span><\/span><span class=\"d-block mt-1\">Loading<\/span><\/span><span class=\"all-loaded d-block pos-abs\">All items loaded <svg width=\"32\" height=\"29\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 29\" style=\"width: 1.5em; height: 1.5em; margin-inline-start: 0.5em;\"><path fill=\"currentColor\" d=\"M25.74 6.23c0.38 0.34 0.42 0.9 0.09 1.28l-12.77 14.58a0.91 0.91 0 0 1-1.33 0.04l-5.46-5.46a0.91 0.91 0 1 1 1.29-1.29l4.77 4.78 12.12-13.85a0.91 0.91 0 0 1 1.29-0.08z\"><\/path><\/svg><\/span><\/a><\/nav><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7548b19 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7548b19\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8df7998\" data-id=\"8df7998\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11a503c e-con-full e-flex e-con e-parent\" data-id=\"11a503c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6d917dd e-con-full e-flex e-con e-child\" data-id=\"6d917dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f38342d elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"f38342d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69eaffb4646ae\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Arrange a free consultation now!<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78f7fc2 elementor-widget__width-initial elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"78f7fc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69eaffb4654d7\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > Get started now and let our experts advise you. Make an appointment with our CTO. <\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08765cd elementor-mobile-align-left elementor-widget elementor-widget-ld_button\" data-id=\"08765cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"https:\/\/devity.eu\/contact\/\"class=\"elementor-button btn btn-underlined border-thin btn-icon-right btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"Make an appointment\" class=\"btn-txt\">\n\t\t\t\t\t\tMake an appointment\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6f3058 e-con-full e-flex e-con e-child\" data-id=\"d6f3058\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1408107 elementor-hidden-mobile elementor-widget elementor-widget-ld_fancy_image\" data-id=\"1408107\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"600\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 530 600&#039;%2F%3E\" class=\"attachment-full size-full wp-image-19194 ld-lazyload\" alt=\"\" itemprop=\"image\" data-src=\"https:\/\/devity.eu\/wp-content\/uploads\/2023\/07\/Design-ohne-Titel-5.png\" data-srcset=\"https:\/\/devity.eu\/wp-content\/uploads\/2023\/07\/Design-ohne-Titel-5.png 530w, https:\/\/devity.eu\/wp-content\/uploads\/2023\/07\/Design-ohne-Titel-5-265x300.png 265w\" data-sizes=\"(max-width: 530px) 100vw, 530px\" data-aspect=\"0.88333333333333\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DEVITY Blog Industrial IoT, security, and digital identity. Practical insights from architecture to operations. Challenges in Implementing Digital Identities in the Industrial IoT What is a digital identity in Industrial IoT and why is it important? Integration of IoT devices: How OPC UA simplifies and secures onboarding IT security solutions for small businesses: The CyberRiskCheck [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-31762","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/pages\/31762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/comments?post=31762"}],"version-history":[{"count":10,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/pages\/31762\/revisions"}],"predecessor-version":[{"id":31841,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/pages\/31762\/revisions\/31841"}],"wp:attachment":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/media?parent=31762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}