{"id":37787,"date":"2023-05-16T10:37:36","date_gmt":"2023-05-16T10:37:36","guid":{"rendered":"https:\/\/cyberleadershipinstitute.com\/?page_id=37787"},"modified":"2023-10-27T05:21:51","modified_gmt":"2023-10-27T05:21:51","slug":"blog","status":"publish","type":"page","link":"https:\/\/cyberleadershipinstitute.com\/blog\/","title":{"rendered":"Blog"},"content":{"rendered":"

Blog<\/strong><\/h1>\n

Home<\/a><\/span><\/span><\/p>\n

Cyber Threats<\/a>, Cybersecurity<\/a>, Data Breaches<\/a> Getting More From Cloud | How to Maximize Business Value Through CloudOps Services <\/p>\n

With more businesses relying on cloud computing to streamline operations and improve scalability, enterprise leaders are adopting a cloud-first approach, combining network, performance, security, endpoint management, and support all through cloud operations, or CloudOps. CloudOps combines both IT processes and DevOps principles to ensure the smooth operation, maintenance, and optimization of a cloud-based infrastructure and its applications. As news headlines are increasingly occupied by data breaches and new security vulnerabilities pose significant risks to businesses, CloudOps has emerged as a crucial component for ensuring the safety and integrity of cloud-based systems. In this post, learn to build and automate a strong cloud-first strategy that can help keep organizations of all sizes …<\/p>\n

Getting More From Cloud | How to Maximize Business Value Through CloudOps Services<\/span> Read More »<\/a><\/p>\n

<\/a>Cyber Threats<\/a>, Cybersecurity<\/a>, Data Breaches<\/a> Strengthening Cyber Defenses | A Guide to Enhancing Modern Tabletop Exercises <\/p>\n

To combat a growing range of cyber threats, enterprise leaders and cybersecurity professionals often employ tabletop exercises as a valuable tool to enhance preparedness and response capabilities. Tabletop exercises simulate real-world cyber incidents in a controlled environment, allowing organizations to test their incident response plans, evaluate team coordination, and identify vulnerabilities. As the overall threat landscape shifts though, it is essential to continuously improve tabletop exercises so that they remain effective. Without the right strategy in place, organizations may not find value in their tabletop exercises.\u00a0Adapting to the changing cybersecurity landscape requires security teams to incorporate the most current\u00a0emerging threats, …<\/p>\n

Strengthening Cyber Defenses | A Guide to Enhancing Modern Tabletop Exercises<\/span> Read More »<\/a><\/p>\n

<\/a>Cyber Threats<\/a>, Cybersecurity<\/a>, Hacking<\/a> Terminator EDR Killer (Spyboy) | Detecting and Preventing a Windows BYOVD Attack <\/p>\n

A Russian-speaking hacker has been making headlines recently after promoting a tool that the threat actor claims can bypass EDR and AV tools. The so-called \u2018Terminator\u2019 tool is said to be able to kill processes belonging to \u201call AVs\/EDRs\/XDRs\u201d, which if used in conjunction with other malware, could allow threat actors to breach defenses. SentinelOne customers are protected from the Terminator EDR tool. In this post, we take a look at how the tool works and how organizations can stay protected from it. What is Terminator EDR Killer? Late last month, a threat actor using the pseudonym \u201cSpyboy\u201d began promoting …<\/p>\n

Terminator EDR Killer (Spyboy) | Detecting and Preventing a Windows BYOVD Attack<\/span> Read More »<\/a><\/p>\n

<\/a>Cyber Tips<\/a>, Cybersecurity<\/a>, Cybersecurity Awareness<\/a> Inside the Mind of a Cyber Attacker | Tactics, Techniques, and Procedures (TTPs) Every Security Practitioner Should Know <\/p>\n

Tactics, techniques, and procedures (TTPs) are the blueprint of threat actors\u2019 attacks \u2013 understanding them allows cyber defenders to better respond to sophisticated attacks. Since the threat landscape continues to become more complex with advancements in malware, nation-state APT campaigns, and cybercrime-as-a-service offerings, TTPs remain a critical source of how enterprises can stay ahead of attacks. TTPs allow security professionals to look inside the minds of threat actors and understand their motivations and malicious goals. This is the first step in crafting effective countermeasures and a long lasting cyber defense posture. This post dives into the evolving TTPs used by modern cyber attackers …<\/p>\n

Inside the Mind of a Cyber Attacker | Tactics, Techniques, and Procedures (TTPs) Every Security Practitioner Should Know<\/span> Read More »<\/a><\/p>\n

<\/a>Career Guidance<\/a>, Cyber Tips<\/a>, Cybersecurity<\/a> Securing the Cloud in Modern Times | How Businesses Can Build Cohesive Cloud-Native Security Strategies <\/p>\n

Cloud security remains front of mind for global enterprise leaders as more businesses migrate to public, private, hybrid, or multi-cloud environments. While the return on investment for using this technology is clear, embedding adequate security in all aspects of cloud applications, infrastructure, and data can prove to be a moving target. The reason for this? As adoption of the cloud reaches higher rates, so too is the challenge of securing these increasingly complex cloud environments. In fact, Gartner reports that enterprises have spent more than $1.3 trillion on cloud technology and that this number could rise to $1.8 trillion by 2025. Other findings on cloud …<\/p>\n

Securing the Cloud in Modern Times | How Businesses Can Build Cohesive Cloud-Native Security Strategies<\/span> Read More »<\/a><\/p>\n

<\/a>Cyber Threats<\/a>, Cybersecurity<\/a>, Hacking<\/a> Defending From the Ground Up | How to Secure the Enterprise\u2019s Digital Attack Surfaces <\/p>\n

For decades, the world has strived for simplification through digitization. In this ongoing pursuit, things have, ironically, become complicated. While countless technologies, applications, and tools are available to help enterprises streamline their work, digitization has increased complexity for many businesses; most notably, expanding their attack surfaces. As the number of connected devices and online services skyrocket, the task of identifying all these assets and managing each of their potential vulnerabilities has become one of the most significant security challenges enterprises face. Digital attack surface management is high-priority for enterprise leaders protecting their operations and brand. In this post, learn what security policies and …<\/p>\n

Defending From the Ground Up | How to Secure the Enterprise\u2019s Digital Attack Surfaces<\/span> Read More »<\/a><\/p>\n

<\/a>Career Guidance<\/a>, Cyber Tips<\/a>, Cybersecurity<\/a> Are You Making One of These 8 Cloud Security Mistakes? <\/p>\n

Though mass adoption has driven an increased awareness and need for cloud security, many businesses continue to make common cloud-related mistakes along their journey. Increased dependency on the cloud has presented challenges for enterprises on two fronts. Externally, threat actors continue to sharpen their focus, developing attacks targeting organizations\u2019 cloud footprint. From an internal standpoint, security leaders face the challenge of accelerating their business objectives, such as growth and innovation, while securing day-to-day operations and the infrastructure that supports it. To better manage their cloud risk profile, enterprises can optimize their cloud security journeys by examining common pitfalls. In this post, learn the top eight …<\/p>\n

Are You Making One of These 8 Cloud Security Mistakes?<\/span> Read More »<\/a><\/p>\n

<\/a>Cyber Threats<\/a>, Cybersecurity<\/a>, Incident Response<\/a> Looking Within | Strategies for Detecting and Mitigating Insider Threats <\/p>\n

Over the past decade, the digital landscape has undergone a rapid transformation, reshaping the way businesses operate and interact with data. With this paradigm shift, the nature and scope of insider threats have also evolved significantly. As cloud adoption rates and reliance on third-party vendors rise, this has widened the attack surface for malicious insiders. With greater access to internal systems, insiders are able to leverage sophisticated attack techniques, putting sensitive data and critical infrastructure at risk. The scope of insider threats encompasses intellectual property theft, insider trading, collusion with external actors, and financial fraud. As insiders become more adept at circumventing traditional security measures, security …<\/p>\n

Looking Within | Strategies for Detecting and Mitigating Insider Threats<\/span> Read More »<\/a><\/p>\n

<\/a>Uncategorized<\/a> Analyzing Attack Opportunities Against Information Security Practitioners <\/p>\n

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit previously unpublished work to showcase their talents and bring their insights to a wider audience. Today\u2019s post is the second in a series highlighting the best entries. Jared Stroud (@DLL_Cool_J \/ Arch Cloud Labs) explores the risks faced by security researchers from attacks by APTs and other threat actors through compromise of security research tools. The study includes discussion of a novel attack vector through popular open-source reverse engineering platform, Ghidra. Background Attacks against the Information Security research community have historically …<\/p>\n

Analyzing Attack Opportunities Against Information Security Practitioners<\/span> Read More »<\/a><\/p>\n

<\/a>Cyber Threats<\/a>, Cybersecurity<\/a>, Incident Response<\/a> Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation <\/p>\n

Threat actors are constantly evolving, consistently developing the tools, tactics, and procedures (TTPs) they use in attacks. In today\u2019s threat landscape, enterprises of all sizes and industries find themselves pitted against professional cybercriminal gangs, advanced persistent threat (APT) groups, and even nation-state actors \u2013 all of whom are leveraging faster attack methods than ever before. In addition to sophisticated TTPs and how organized many cybercrime-as-a-service models have become, enterprises also face the reality of how quickly active threats can become full-blown incidents. Speed, in both cybersecurity and cyberattacks, is the key metric to pay attention to as it defines the success of either …<\/p>\n

Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation<\/span> Read More »<\/a><\/p>\n

<\/a> 1<\/span>2<\/a>3<\/a>…<\/span>7<\/a>>><\/a> <\/p>\n

<\/span><\/span>Search<\/span>Latest Blog<\/p>\n

Getting More From Cloud | How to Maximize Business Value Through CloudOps Services<\/a><\/span><\/h2>\n

Strengthening Cyber Defenses | A Guide to Enhancing Modern Tabletop Exercises<\/a><\/span><\/h2>\n

Clouds In the Attack Horizon | How Identity & Access Controls Fortifies Hybrid Environments<\/a><\/span><\/h2>\n

Four Years of Building the Cyber Leadership Institute \u2013 My Reflections<\/a><\/span><\/h2>\n

Accelerating Cyber Resilience Through High-Impact Strategies\u00a0<\/a><\/span><\/h2>\n

Proven Strategies To Drive Lasting Cyber Cultural Transformation\u00a0<\/a><\/span><\/h2>\n

Recent News<\/p>\n

Cyber Leaders on the Move: Halilu, Manager of Information Security Governance at Queensland Health<\/a><\/span><\/h2>\n

CLI Announces New Partnership with MyCISO<\/a><\/span><\/h2>\n

CLI Announces New Partnership with SentinelOne<\/a><\/span><\/h2>\n

Phil Zongo accepted into Forbes Business Council<\/a><\/span><\/h2>\n

Cyber Leaders on the Move: Vandana Verma \u2014 Global Chair of OWASP and Security Relations Leader APJ, ANZ region at Snyk<\/a><\/span><\/h2>\n

Cyber Leaders on the Move: Joss Howard \u2014 Cybersecurity Partner at McGrathNicol.<\/a><\/span><\/h2>\n","protected":false},"excerpt":{"rendered":"

Blog Home Cyber Threats, Cybersecurity, Data Breaches Getting More From Cloud | How to Maximize Business Value Through CloudOps Services […]<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"acf":[],"yoast_head":"\nBlog - Cyber Leadership Institute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberleadershipinstitute.com\/blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blog\" \/>\n<meta property=\"og:description\" content=\"BlogHomeCyber Threats, Cybersecurity, Data Breaches Getting More From Cloud | How to Maximize Business Value Through CloudOps Services With more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberleadershipinstitute.com\/blog\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Leadership Institute\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/cyberleadershipinstitute\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-27T05:21:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/shutterstock_379950595-2000px1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@C_L_Institute\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/blog\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/blog\/\",\"name\":\"Blog - Cyber Leadership Institute\",\"isPartOf\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\"},\"datePublished\":\"2023-05-16T10:37:36+00:00\",\"dateModified\":\"2023-10-27T05:21:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/blog\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberleadershipinstitute.com\/blog\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/blog\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberleadershipinstitute.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"name\":\"Cyber Leadership Institute\",\"description\":\"Know You're Ready\",\"publisher\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\",\"name\":\"Cyber Leadership Institute\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"width\":512,\"height\":512,\"caption\":\"Cyber Leadership Institute\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/cyberleadershipinstitute\",\"https:\/\/x.com\/C_L_Institute\",\"https:\/\/www.instagram.com\/cyber_leadership_institute\/\",\"https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Blog - Cyber Leadership Institute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberleadershipinstitute.com\/blog\/","og_locale":"en_US","og_type":"article","og_title":"Blog","og_description":"BlogHomeCyber Threats, Cybersecurity, Data Breaches Getting More From Cloud | How to Maximize Business Value Through CloudOps Services With more","og_url":"https:\/\/cyberleadershipinstitute.com\/blog\/","og_site_name":"Cyber Leadership Institute","article_publisher":"https:\/\/facebook.com\/cyberleadershipinstitute","article_modified_time":"2023-10-27T05:21:51+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/shutterstock_379950595-2000px1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@C_L_Institute","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberleadershipinstitute.com\/blog\/","url":"https:\/\/cyberleadershipinstitute.com\/blog\/","name":"Blog - Cyber Leadership Institute","isPartOf":{"@id":"https:\/\/cyberleadershipinstitute.com\/#website"},"datePublished":"2023-05-16T10:37:36+00:00","dateModified":"2023-10-27T05:21:51+00:00","breadcrumb":{"@id":"https:\/\/cyberleadershipinstitute.com\/blog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberleadershipinstitute.com\/blog\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberleadershipinstitute.com\/blog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberleadershipinstitute.com\/"},{"@type":"ListItem","position":2,"name":"Blog"}]},{"@type":"WebSite","@id":"https:\/\/cyberleadershipinstitute.com\/#website","url":"https:\/\/cyberleadershipinstitute.com\/","name":"Cyber Leadership Institute","description":"Know You're Ready","publisher":{"@id":"https:\/\/cyberleadershipinstitute.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberleadershipinstitute.com\/#organization","name":"Cyber Leadership Institute","url":"https:\/\/cyberleadershipinstitute.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","width":512,"height":512,"caption":"Cyber Leadership Institute"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/cyberleadershipinstitute","https:\/\/x.com\/C_L_Institute","https:\/\/www.instagram.com\/cyber_leadership_institute\/","https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"authorship-box-avatar":false,"authorship-box-related":false},"uagb_author_info":{"display_name":"hnecesario","author_link":"https:\/\/cyberleadershipinstitute.com\/author\/hnecesario\/"},"uagb_comment_info":0,"uagb_excerpt":"Blog Home Cyber Threats, Cybersecurity, Data Breaches Getting More From Cloud | How to Maximize Business Value Through CloudOps Services […]","_links":{"self":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/37787"}],"collection":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/comments?post=37787"}],"version-history":[{"count":21,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/37787\/revisions"}],"predecessor-version":[{"id":40048,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/37787\/revisions\/40048"}],"wp:attachment":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/media?parent=37787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}