{"id":11139,"date":"2025-08-14T16:28:08","date_gmt":"2025-08-14T15:28:08","guid":{"rendered":"https:\/\/amtivo.com\/ie\/?post_type=resources-filter&#038;p=11139"},"modified":"2026-02-06T10:13:00","modified_gmt":"2026-02-06T10:13:00","slug":"threat-intelligence-policy-template","status":"publish","type":"resources-filter","link":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/","title":{"rendered":"Free Threat Intelligence Policy Template for Irish Firms"},"content":{"rendered":"<p><b><span data-contrast=\"auto\">Strengthen your organisation&#8217;s cyber security resilience with our free, downloadable Threat Intelligence Policy template.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<p><strong>Enter and submit your email below to download this free resource.<\/strong><\/p>\r\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script> \r\n<script> \r\n  hbspt.forms.create({ \r\n    portalId: \"5498870\", \r\n    formId: \"7a91a5ee-8b6d-4d94-8a7b-f75e0cfbffdb\", \r\n    region: \"na1\" \r\n  }); \r\n<\/script> \r\n<h2><b><span data-contrast=\"auto\">What is a Threat Intelligence Policy?<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\r\n<p><span data-contrast=\"auto\">A Threat Intelligence Policy is a formal document that defines how an organisation collects, analyses, and responds to information about potential or existing cyber threats. A comprehensive Threat Intelligence Policy:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<ul>\r\n\t<li><span data-contrast=\"auto\">Details processes for collecting and analysing threat data<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Assigns responsibilities for ongoing threat monitoring and incident response<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Outlines procedures for updating security measures based on intelligence findings<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Demonstrates proactive risk management to reduce vulnerabilities<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<p><span data-contrast=\"auto\">Implementing a robust Threat Intelligence Policy helps businesses:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<ul>\r\n\t<li><span data-contrast=\"auto\">Stay updated on emerging cyber threats specific to Ireland and the EU<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Make informed, data-driven decisions to protect systems and assets<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Maintain compliance with Irish and European cyber security regulations<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Strengthen overall cyber resilience and readiness<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<p><span data-contrast=\"auto\">By defining these processes clearly, organisations can better anticipate threats, minimise security gaps, and ensure a strong cyber security framework.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<h2><b><span data-contrast=\"auto\">Why Threat Intelligence Policies Are More Important Than Ever<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\r\n<p><span data-contrast=\"auto\">In today&#8217;s digital landscape, cyber threats are becoming increasingly sophisticated, making proactive threat intelligence essential for organisations.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<p><b><span data-contrast=\"auto\">Key statistics:<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<ul>\r\n\t<li><span data-contrast=\"auto\">The Hiscox Cyber Readiness Report 2024 indicates that <\/span><b><span data-contrast=\"auto\">74% of Irish organisations reported an increase in cyber attacks<\/span><\/b><span data-contrast=\"auto\"> over the past 12 months.<\/span> <em>(Source: <a href=\"https:\/\/www.hiscox.ie\/cyber-readiness-report-2024\">Hiscox Cyber Readiness Report 2024<\/a>)<\/em>\u00a0<\/li>\r\n\t<li><span data-contrast=\"auto\">Ireland accounts for <\/span><b><span data-contrast=\"auto\">20% of cyber security incidents reported in Europe<\/span><\/b><span data-contrast=\"auto\">, ranking among the most targeted EU countries <em>(Source: <\/em><\/span><em><a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024\">ENISA Threat Landscape 2024<\/a>)<\/em><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">A recent <\/span><b><span data-contrast=\"auto\">RT\u00c9 report<\/span><\/b><span data-contrast=\"auto\"> indicates a <\/span><b><span data-contrast=\"auto\">20% increase in hacking attempts<\/span><\/b><span data-contrast=\"auto\"> targeting critical infrastructure in Ireland over the last year, linked to rapid AI development<\/span> <em>(Source: <a href=\"https:\/\/www.rte.ie\/news\/business\/2025\/0107\/1489512-smarttech247-ai-survey\/\">Smarttech247 Research, RT\u00c9, 2025<\/a>)\u00a0<\/em><\/li>\r\n<\/ul>\r\n<p><b><span data-contrast=\"auto\">Without a formal threat intelligence policy, businesses risk:<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<ul>\r\n\t<li><span data-contrast=\"auto\">Delayed detection of cyber threats<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Inadequate response to security incidents<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Non-compliance with cyber security regulations<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Reputational damage and financial loss<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<p><span data-contrast=\"auto\">A well-defined Threat Intelligence Policy is essential for mitigating these risks and supporting business continuity.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<div class=\"bnt-html-banner container-fluid\" data-banner-id=\"12407\" style=\"background-color: #ffffff; padding: 30px;\"><div class=\"row\"><div class=\"col-md-9 bnt-content-col\"><div class=\"bnt-main-title\"><h3>Download Your Threat Intelligence Policy Template<\/h3>\n<\/div><div class=\"bnt-main-text\"><p>A Threat Intelligence Policy can help to support a consistent approach to documenting threat intelligence activities.<\/p>\n<\/div><a href=\"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/#top\" class=\"htmlBannerBtn orangeBtnCta\" data-banner-id=\"12407\">Learn More<\/a><\/div><div class=\"col-md-3 bnt-image-col\"><img decoding=\"async\" src=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/12\/image.png\" alt=\"Templates - icon\" class=\"img-fluid bnt-thumbnail\"><\/div><\/div><\/div>\r\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<h2><b><span data-contrast=\"auto\">Why This Matters for ISO Certification<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\r\n<p><span data-contrast=\"auto\">Certification bodies require documented threat intelligence and risk management processes. A detailed Threat Intelligence Policy provides evidence of systematic, risk-based practices that are essential for ISO audits.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<p><span data-contrast=\"auto\">Relevant ISO standards where this policy plays a key role:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<ul>\r\n\t<li><a title=\"ISO 9001\u2014Quality Management Systems\" href=\"https:\/\/amtivo.com\/ie\/iso-certification\/iso-9001\/\" rel=\"noopener\"><span data-contrast=\"auto\">ISO 9001 &#8211; <\/span><span data-contrast=\"auto\">Quality Management Systems<\/span><\/a><span>\u00a0<br \/>\r\n<\/span><span class=\"TextRun SCXW13296780 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW13296780 BCX0\">Calls for managing external risks that could affect service delivery and quality<\/span><span class=\"NormalTextRun CommentStart SCXW13296780 BCX0\">.<\/span><\/span><span class=\"EOP SCXW13296780 BCX0\" data-ccp-props=\"{&quot;335559731&quot;:720}\">\u00a0<\/span><\/li>\r\n\t<li><a title=\"ISO 27001\u2014Information Security Management\" href=\"https:\/\/amtivo.com\/ie\/iso-certification\/iso-22301\/\"><span data-contrast=\"auto\">ISO 22301 &#8211; <\/span><span data-contrast=\"auto\">Business Continuity Management Systems<\/span><\/a><span>\u00a0<br \/>\r\n<\/span><span class=\"TextRun SCXW52298995 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW52298995 BCX0\">Highlights understanding of cyber threats for effective continuity planning<\/span><span class=\"NormalTextRun SCXW52298995 BCX0\">.<\/span><\/span><span class=\"EOP SCXW52298995 BCX0\" data-ccp-props=\"{&quot;335559685&quot;:720}\">\u00a0<\/span><\/li>\r\n\t<li><span><a title=\"ISO 27001\u2014Information Security Management\" href=\"https:\/\/amtivo.com\/ie\/iso-certification\/iso-27001\/\" rel=\"noopener\">ISO 27001 &#8211; Information Security Management Systems<\/a> <br \/>\r\n<\/span><span class=\"TextRun SCXW61740481 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW61740481 BCX0\">Requires identification and assessment of security risks, including those from external threat actors<\/span><span class=\"NormalTextRun SCXW61740481 BCX0\">.<\/span><\/span><span class=\"EOP SCXW61740481 BCX0\" data-ccp-props=\"{&quot;335559685&quot;:720}\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<h2><b><span data-contrast=\"auto\">Get Started Today<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\r\n<p><span data-contrast=\"auto\">Our free template helps organisations streamline threat intelligence efforts and align with ISO requirements. Strengthen your cyber security posture and prepare for smoother audits and certification success.<\/span><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<p><strong>Enter and submit your email below to download this free resource.<\/strong><\/p>\r\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script> \r\n<script> \r\n  hbspt.forms.create({ \r\n    portalId: \"5498870\", \r\n    formId: \"7a91a5ee-8b6d-4d94-8a7b-f75e0cfbffdb\", \r\n    region: \"na1\" \r\n  }); \r\n<\/script> ","protected":false},"excerpt":{"rendered":"Define processes for managing threat data, assigning roles and responding to incidents.","protected":false},"author":24,"featured_media":12682,"template":"","resource":[197],"resource-tag":[147,142,92],"class_list":["post-11139","resources-filter","type-resources-filter","status-publish","has-post-thumbnail","hentry","resource-technical","resource-tag-iso-22301","resource-tag-iso-27001","resource-tag-iso-9001"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Free Threat Intelligence Policy Template for Irish Firms<\/title>\n<meta name=\"description\" content=\"Download a free Threat Intelligence Policy template for Irish organisations. Define processes for managing threat data, assigning roles and responding to incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Free Threat Intelligence Policy Template for Irish Firms\" \/>\n<meta property=\"og:description\" content=\"Download a free Threat Intelligence Policy template for Irish organisations. Define processes for managing threat data, assigning roles and responding to incidents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo Ireland\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-06T10:13:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/11\/Template-Thumbnail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"367\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Free Threat Intelligence Policy Template for Irish Firms","description":"Download a free Threat Intelligence Policy template for Irish organisations. Define processes for managing threat data, assigning roles and responding to incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/","og_locale":"en_GB","og_type":"article","og_title":"Free Threat Intelligence Policy Template for Irish Firms","og_description":"Download a free Threat Intelligence Policy template for Irish organisations. Define processes for managing threat data, assigning roles and responding to incidents.","og_url":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/","og_site_name":"Amtivo Ireland","article_modified_time":"2026-02-06T10:13:00+00:00","og_image":[{"width":600,"height":367,"url":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/11\/Template-Thumbnail.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/#article","isPartOf":{"@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/"},"author":{"name":"Julian Russell","@id":"https:\/\/amtivo.com\/ie\/#\/schema\/person\/2933ac821223894f855a462421886937"},"headline":"Free Threat Intelligence Policy Template for Irish Firms","datePublished":"2025-08-14T15:28:08+00:00","dateModified":"2026-02-06T10:13:00+00:00","mainEntityOfPage":{"@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/"},"wordCount":459,"publisher":{"@id":"https:\/\/amtivo.com\/ie\/#organization"},"image":{"@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/11\/Template-Thumbnail.png","inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/","url":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/","name":"Free Threat Intelligence Policy Template for Irish Firms","isPartOf":{"@id":"https:\/\/amtivo.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/11\/Template-Thumbnail.png","datePublished":"2025-08-14T15:28:08+00:00","dateModified":"2026-02-06T10:13:00+00:00","description":"Download a free Threat Intelligence Policy template for Irish organisations. Define processes for managing threat data, assigning roles and responding to incidents.","breadcrumb":{"@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/#primaryimage","url":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/11\/Template-Thumbnail.png","contentUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/11\/Template-Thumbnail.png","width":600,"height":367,"caption":"Amtivo - Template"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/ie\/resources\/technical\/threat-intelligence-policy-template\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/amtivo.com\/ie\/all-resources\/"},{"@type":"ListItem","position":3,"name":"Technical","item":"https:\/\/amtivo.com\/ie\/resources\/technical\/"},{"@type":"ListItem","position":4,"name":"Free Threat Intelligence Policy Template for Irish Firms"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/ie\/#website","url":"https:\/\/amtivo.com\/ie\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/ie\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/06\/amtivo-logo-new.png","contentUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/06\/amtivo-logo-new.png","width":400,"height":331,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/ie\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/amtivo.com\/ie\/#\/schema\/person\/2933ac821223894f855a462421886937","name":"Julian Russell","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/03\/julian-russell_avatar-96x96.jpg","url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/03\/julian-russell_avatar-96x96.jpg","contentUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/03\/julian-russell_avatar-96x96.jpg","caption":"Julian Russell"},"sameAs":["https:\/\/www.linkedin.com\/in\/juliandrussell\/?miniProfileUrn=urn3Ali3Afs_miniProfile3AACoAAALhzNsB8Wn7AqeQBGa8OxBIrtgXH_ceOB0&skipRedirect=true&miniProfileUrn=urnlifs_miniProfileACoAAALhzNsB8Wn7AqeQBGa8OxBIrtgXH_ceOB0"],"url":"https:\/\/amtivo.com\/ie\/technical-expert\/julian\/"}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter\/11139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter"}],"about":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/types\/resources-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":11,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter\/11139\/revisions"}],"predecessor-version":[{"id":12417,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter\/11139\/revisions\/12417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/media\/12682"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/media?parent=11139"}],"wp:term":[{"taxonomy":"resource","embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resource?post=11139"},{"taxonomy":"resource-tag","embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resource-tag?post=11139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}