{"id":42264,"date":"2024-01-11T09:42:18","date_gmt":"2024-01-11T09:42:18","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=42264"},"modified":"2024-01-11T09:42:52","modified_gmt":"2024-01-11T09:42:52","slug":"what-is-cybereason-and-use-cases-of-cybereason","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/what-is-cybereason-and-use-cases-of-cybereason\/","title":{"rendered":"What is Cybereason and use cases of Cybereason?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is Cybereason?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-63-1024x576.png\" alt=\"\" class=\"wp-image-42267\" style=\"width:660px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-63-1024x576.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-63-300x169.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-63-768x432.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-63-1536x864.png 1536w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-63-355x199.png 355w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-63.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>What is Cybereason<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Cybereason is an American cybersecurity technology organization situated in 2012. They provide a comprehensive <strong>endpoint protection platform<\/strong> focused on preventing, detecting, and responding to advanced cyber threats. Here&#8217;s a breakdown:<\/p>\n\n\n\n<p><strong>What they do:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Endpoint Protection:<\/strong> Provides antivirus, endpoint detection and response (EDR), and multi-layered defense against modern threats.<\/li>\n\n\n\n<li><strong>Extended Attack Surface Protection:<\/strong> Secures identities, workspaces, and cloud environments.<\/li>\n\n\n\n<li><strong>Security Operations Optimization:<\/strong> Offers threat hunting, managed detection and response (MDR), and incident response services.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AI-powered detection:<\/strong> Leverages machine learning and behavioral analysis to identify suspicious activity and prevent attacks.<\/li>\n\n\n\n<li><strong>Automated response:<\/strong> Takes instant action to contain threats and minimize damage.<\/li>\n\n\n\n<li><strong>Comprehensive visibility:<\/strong> Provides a unified view of your entire security posture across endpoints, networks, and cloud environments.<\/li>\n\n\n\n<li><strong>Threat intelligence:<\/strong> Offers insights into the latest cyber threats and attacker tactics.<\/li>\n\n\n\n<li><strong>Intuitive interface:<\/strong> Makes it easy for security teams to manage and investigate threats.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Top 10 use cases of Cybereason?<\/h2>\n\n\n\n<p>Top 10 Use Cases for Cybereason:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Preventing Zero-day Attacks:<\/strong> Automatically detect and block sophisticated, never-before-seen threats.<\/li>\n\n\n\n<li><strong>Stopping Ransomware:<\/strong> Quickly identify and contain ransomware outbreaks before they encrypt data.<\/li>\n\n\n\n<li><strong>Hunting Advanced Threats:<\/strong> Proactively search for hidden threats lurking within your network.<\/li>\n\n\n\n<li><strong>Incident Response:<\/strong> Rapidly respond to security incidents and minimize damage.<\/li>\n\n\n\n<li><strong>Endpoint Protection:<\/strong> Secure endpoints against malware, phishing, and other attacks.<\/li>\n\n\n\n<li><strong>Cloud Security:<\/strong> Extend protection to cloud environments like AWS and Azure.<\/li>\n\n\n\n<li><strong>Identity Security:<\/strong> Secure user identities and prevent unauthorized access.<\/li>\n\n\n\n<li><strong>Threat Intelligence:<\/strong> Gain insights into the latest cyber threats and trends.<\/li>\n\n\n\n<li><strong>EDR &amp; XDR Integration:<\/strong> Integrate with existing security tools for a unified view.<\/li>\n\n\n\n<li><strong>Managed Security Services:<\/strong> Offload security operations to experienced Cybereason experts.<\/li>\n<\/ol>\n\n\n\n<p><strong>Overall, Cybereason offers a powerful and versatile security platform for organizations of all sizes.<\/strong> Whether you&#8217;re looking to prevent zero-day attacks, stop ransomware, or improve your overall security posture, Cybereason can help.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the feature of Cybereason?<\/h2>\n\n\n\n<p>Cybereason boasts a range of impressive features designed to combat modern cyber threats. Following is a breakdown of some key highlights:<\/p>\n\n\n\n<p><strong>1. Multi-layered Endpoint Protection:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>NGAV (Next-Generation Anti-Virus):<\/strong> Employs multiple anti-malware engines and behavior analysis to detect and block known and unknown threats, including ransomware, zero-day attacks, and fileless malware.<\/li>\n\n\n\n<li><strong>EDR (Endpoint Detection and Response):<\/strong> Provides real-time visibility into endpoint activity, identifying suspicious behavior and enabling rapid response to potential threats.<\/li>\n\n\n\n<li><strong>Endpoint Controls:<\/strong> Granular control over USB devices, network connections, and application execution to harden endpoints and reduce the attack surface.<\/li>\n\n\n\n<li><strong>Anti-Exploit:<\/strong> Employs virtual patching and memory protection techniques to prevent attackers from exploiting software vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Extended Attack Surface Protection:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identity Security:<\/strong> Protects against identity-based attacks by securing user access and credentials.<\/li>\n\n\n\n<li><strong>Workspace Security:<\/strong> Secures endpoints regardless of location or device, including desktops, laptops, mobile devices, and cloud workstations.<\/li>\n\n\n\n<li><strong>Security Command Center:<\/strong> Provides a unified view of all security events across the entire IT environment.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Security Operations Optimization:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat Hunting:<\/strong> Proactive approach to uncover hidden threats through advanced analytics and human expertise.<\/li>\n\n\n\n<li><strong>MDR (Managed Detection and Response):<\/strong> 24\/7 threat monitoring and response by Cybereason security experts, freeing up internal resources.<\/li>\n\n\n\n<li><strong>Incident Response:<\/strong> Rapid and effective response to security incidents to minimize damage and restore operations.<\/li>\n\n\n\n<li><strong>Digital Forensics &amp; IR:<\/strong> Investigates security incidents to identify the root cause and prevent future occurrences.<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Additional Features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Machine Learning &amp; AI:<\/strong> Cybereason leverages advanced AI and machine learning algorithms to power its detection and response capabilities.<\/li>\n\n\n\n<li><strong>Automated Remediation:<\/strong> Automates threat response actions to neutralize threats quicker and minimize human intervention.<\/li>\n\n\n\n<li><strong>Intuitive UI &amp; UX:<\/strong> User-friendly interface allows security teams to easily manage and investigate threats.<\/li>\n\n\n\n<li><strong>Threat Intelligence:<\/strong> Provides access to Cybereason&#8217;s rich repository of threat intelligence to stay ahead of attackers.<\/li>\n<\/ul>\n\n\n\n<p>Overall, Cybereason&#8217;s features stand out for their comprehensiveness, automation capabilities, and focus on AI-powered defense. They offer a robust solution for organizations seeking to protect against today&#8217;s sophisticated cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Cybereason works and Architecture?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"525\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-64-1024x525.png\" alt=\"\" class=\"wp-image-42268\" style=\"width:657px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-64-1024x525.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-64-300x154.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-64-768x394.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-64-1536x787.png 1536w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-64.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Cybereason works and Architecture<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Cybereason&#8217;s capabilities are powered by a sophisticated architecture designed for efficient threat detection, response, and containment. Following is a breakdown of how it works:<\/p>\n\n\n\n<p><strong>1. Data collection and ingestion:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Agents installed on endpoints and other devices continuously collect security data (logs, event data, system changes, file changes).<\/li>\n\n\n\n<li>Cybereason Connect acts as an intermediary, collecting and pre-processing data from various sources before sending it to the platform.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Analysis and detection:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Cybereason Defense Platform performs real-time analysis of the ingested data using multiple layers of defense:\n<ul class=\"wp-block-list\">\n<li><strong>Next-generation antivirus:<\/strong> Scans for known malware signatures and suspicious file behavior.<\/li>\n\n\n\n<li><strong>Behavior-based analytics:<\/strong> Identifies abnormal activity indicating potential threats, even zero-day attacks.<\/li>\n\n\n\n<li><strong>Machine learning algorithms:<\/strong> Analyze patterns and relationships across all data to uncover sophisticated threats.<\/li>\n\n\n\n<li><strong>Global Threat Intelligence:<\/strong> Continuously updates the platform with the latest threat information from trusted sources.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Visualization and investigation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The platform presents a unified view of security events through an intuitive dashboard and timeline.<\/li>\n\n\n\n<li>Analysts can investigate suspected threats in detail, examining related events, files, and network activity across all affected devices.<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Response and remediation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybereason offers automated and manual response options:\n<ul class=\"wp-block-list\">\n<li><strong>Automated actions:<\/strong> Quarantines infected devices, blocks malicious domains and IPs, and terminates suspicious processes.<\/li>\n\n\n\n<li><strong>Manual actions:<\/strong> Security teams can take further actions based on their investigation, such as isolating specific endpoints, rolling back changes, or contacting affected users.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>5. Continuous improvement:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybereason automatically learns and adapts based on new data and emerging threats.<\/li>\n\n\n\n<li>Threat intelligence updates and improved machine learning models continuously enhance the platform&#8217;s detection and response capabilities.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key architectural components:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Agents:<\/strong> Lightweight agents residing on endpoints and devices perform local data collection and initial threat analysis.<\/li>\n\n\n\n<li><strong>Cybereason Connect:<\/strong> Acts as a gateway for data intake and normalization, preparing data for ingestion by the platform.<\/li>\n\n\n\n<li><strong>Detection Server:<\/strong> Performs real-time analysis of data using machine learning, threat intelligence, and behavioral algorithms.<\/li>\n\n\n\n<li><strong>Central Console:<\/strong> Provides a unified view of security events, threat investigations, and response options.<\/li>\n\n\n\n<li><strong>Global Threat Intelligence Server:<\/strong> Aggregates and analyzes threat data from various sources to keep the platform updated on the latest threats.<\/li>\n<\/ul>\n\n\n\n<p>Overall, Cybereason&#8217;s architecture combines real-time data analysis, advanced threat detection methods, and intuitive visualization tools to empower security teams to effectively prevent, detect, and respond to cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Install Cybereason it?<\/h2>\n\n\n\n<p>Installing Cybereason requires access to the Cybereason Defense Platform and administrative privileges on the target endpoints. Here&#8217;s a general guide:<\/p>\n\n\n\n<p><strong>1. Prepare your environment:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure you have a valid account and access to the Cybereason Defense Platform.<\/li>\n\n\n\n<li>Download the sensor installation file(s) from the platform using the <strong>System &gt; Overview &gt; Download Cybereason Installers<\/strong> section.<\/li>\n\n\n\n<li>Choose the appropriate platform (Windows, macOS, Linux) and sensor group (if applicable).<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Install the sensor on a Windows device:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Run the downloaded <code class=\"\">.msi<\/code> file.<\/li>\n\n\n\n<li>Accept the license agreement and choose the installation directory (default recommended).<\/li>\n\n\n\n<li>Provide administrative credentials if prompted.<\/li>\n\n\n\n<li>Use the on-screen instructions and accomplish the installation.<\/li>\n\n\n\n<li>Restart the computer.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Install the sensor on a macOS device:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Run the downloaded <code class=\"\">.pkg<\/code> file.<\/li>\n\n\n\n<li>Permit to the license agreement and use the on-screen instructions.<\/li>\n\n\n\n<li>Put your administrator password during the installation process.<\/li>\n\n\n\n<li>The sensor will automatically start running in the background.<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Install the sensor on a Linux device:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use the command line to install the downloaded <code class=\"\">.deb<\/code> or <code class=\"\">.rpm<\/code> file depending on your Linux distribution.<\/li>\n\n\n\n<li>Follow the on-screen instructions or refer to the Cybereason documentation for specific Linux installation commands.<\/li>\n\n\n\n<li>Verify the sensor is running using the <code class=\"\">cybereason-sensor status<\/code> command.<\/li>\n<\/ul>\n\n\n\n<p><strong>5. Verify the installation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access the Cybereason Defense Platform and navigate to the <strong>System &gt; Sensors<\/strong> section.<\/li>\n\n\n\n<li>The installed sensor should now be visible, showing its online status and version information.<\/li>\n<\/ul>\n\n\n\n<p>These are general steps, and specific instructions might vary depending on your organization&#8217;s configuration and desired settings.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Basic Tutorials of Cybereason: Getting Started<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-65-1024x536.png\" alt=\"\" class=\"wp-image-42269\" style=\"width:692px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-65-1024x536.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-65-300x157.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-65-768x402.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-65.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Basic Tutorials of Cybereason<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Cybereason offers a robust endpoint protection platform (EPP) with advanced features to combat modern cyber threats. Here are some step-by-step basic tutorials to get you started:<\/p>\n\n\n\n<p><strong>1. Installing the Cybereason Sensor:<\/strong><\/p>\n\n\n\n<p><strong>Requirements:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Valid Cybereason Defense Platform account<\/li>\n\n\n\n<li>Administrative privileges on target endpoints<\/li>\n<\/ul>\n\n\n\n<p><strong>Steps:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Download the Sensor:<\/strong> Log in to the Cybereason Defense Platform and navigate to <strong>System &gt; Overview &gt; Download Cybereason Installers<\/strong>. Choose the platform (Windows, macOS, Linux) and sensor group (if applicable).<\/li>\n\n\n\n<li><strong>Install on Windows:<\/strong> Run the downloaded <code class=\"\">.msi<\/code> file. Accept the license agreement and choose the installation directory. Provide administrative credentials if prompted. Follow the on-screen instructions and restart the computer.<\/li>\n\n\n\n<li><strong>Install on macOS:<\/strong> Run the downloaded <code class=\"\">.pkg<\/code> file. Permit to the license agreement and apply the on-screen instructions. Enter your administrator password during installation. The sensor will automatically start running.<\/li>\n\n\n\n<li><strong>Install on Linux:<\/strong> Use the command line to install the downloaded <code class=\"\">.deb<\/code> or <code class=\"\">.rpm<\/code> file based on your distribution. Follow the on-screen instructions or refer to Cybereason documentation for specific commands. Verify the sensor is running using <code class=\"\">cybereason-sensor status<\/code>.<\/li>\n<\/ol>\n\n\n\n<p><strong>2. Exploring the Cybereason Dashboard:<\/strong><\/p>\n\n\n\n<p>Once the sensor is installed, access the Cybereason Defense Platform dashboard. Here&#8217;s a quick overview:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Navigation bar:<\/strong> Provides access to key functionalities like <strong>System, Events, Investigations, Policies, Reports, Settings<\/strong>.<\/li>\n\n\n\n<li><strong>Overview panel:<\/strong> Displays key security metrics like active detections, blocked processes, endpoint health, and vulnerability trends.<\/li>\n\n\n\n<li><strong>Widgets:<\/strong> Customizable sections offering deeper insights into specific areas like threats, endpoints, investigations, and reports. Drag and drop to personalize your dashboard layout.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Basic Threat Hunting:<\/strong><\/p>\n\n\n\n<p>Cybereason&#8217;s Investigate tab empowers you to proactively search for suspicious activity.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Go to Investigate:<\/strong> Click the <strong>Investigate<\/strong> tab in the navigation bar.<\/li>\n\n\n\n<li><strong>Build a Search:<\/strong> In the search bar, enter keywords, indicators of compromise (IOCs), or filter by specific parameters like device name, process name, or source IP address.<\/li>\n\n\n\n<li><strong>Explore Results:<\/strong> The search results display events matching your criteria. Analyze event details, timelines, and associated files for further investigation.<\/li>\n\n\n\n<li><strong>Take Action:<\/strong> If you find suspicious activity, you can take actions like isolating the endpoint, blocking a file, or initiating an investigation workflow.<\/li>\n<\/ol>\n\n\n\n<p><strong>4. Managing Endpoint Policies:<\/strong><\/p>\n\n\n\n<p>Policies define security configurations and actions for your endpoints.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Go to Policies:<\/strong> Click the <strong>Policies<\/strong> tab in the navigation bar.<\/li>\n\n\n\n<li><strong>Browse Existing Policies:<\/strong> Review pre-defined policies or create custom ones by clicking <strong>New Policy<\/strong>.<\/li>\n\n\n\n<li><strong>Configure Settings:<\/strong> Define settings like antivirus scanning, application control, device control, and response actions.<\/li>\n\n\n\n<li><strong>Assign Policies to Groups:<\/strong> Select target endpoint groups for each policy application.<\/li>\n<\/ol>\n\n\n\n<p>These are basic tutorials to get you familiar with Cybereason&#8217;s core functionalities. As you progress, explore the platform&#8217;s advanced features and leverage its full potential to secure your endpoints against evolving cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Cybereason? Cybereason is an American cybersecurity technology organization situated in 2012. They provide a comprehensive endpoint protection platform focused on preventing, detecting, and responding to advanced cyber threats&#8230;. <\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-42264","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=42264"}],"version-history":[{"count":1,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42264\/revisions"}],"predecessor-version":[{"id":42270,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42264\/revisions\/42270"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=42264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=42264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=42264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}