{"id":7,"date":"2012-06-05T23:47:42","date_gmt":"2012-06-05T23:47:42","guid":{"rendered":"http:\/\/112.109.118.49\/cdr\/wordpress\/?page_id=7"},"modified":"2015-12-04T16:55:26","modified_gmt":"2015-12-04T16:55:26","slug":"about-us","status":"publish","type":"page","link":"https:\/\/cyberdefenseresearch.com\/?page_id=7","title":{"rendered":"About Us"},"content":{"rendered":"<p>We are a group of independent researchers and cyber security specialists dedicated to the advancement of the concept of cyber street smarts.\u00a0 As Han Solo so eloquently said, \u201cTraveling through hyperspace ain\u2019t like dusting crops!\u201d<\/p>\n<p>Well, we see it the same way,\u00a0 \u201cNavigating around cyber space ain\u2019t like dusting crops!\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are a group of independent researchers and cyber security specialists dedicated to the advancement of the concept of cyber street smarts.\u00a0 As Han Solo so eloquently said, \u201cTraveling through hyperspace ain\u2019t like dusting crops!\u201d Well, we see it the &hellip; <a href=\"https:\/\/cyberdefenseresearch.com\/?page_id=7\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-7","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7"}],"version-history":[{"count":0,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/7\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}