{"id":1025,"date":"2021-11-24T19:43:30","date_gmt":"2021-11-24T19:43:30","guid":{"rendered":"http:\/\/www.cyberdna.com.au\/cyber-automation\/?page_id=1025"},"modified":"2021-12-03T16:17:23","modified_gmt":"2021-12-03T16:17:23","slug":"automated-incident-response","status":"publish","type":"page","link":"http:\/\/www.cyberdna.com.au\/cyber-automation\/automated-incident-response\/","title":{"rendered":"Automated Incident Response"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-d9414c57dcfb9dbf0df40d2b16107d09\">\n.avia-section.av-av_section-d9414c57dcfb9dbf0df40d2b16107d09 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/automated_response_hero.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-av_section-d9414c57dcfb9dbf0df40d2b16107d09 .av-section-color-overlay{\nopacity:0.4;\nbackground-color:#474747;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-av_section-d9414c57dcfb9dbf0df40d2b16107d09 main_color avia-section-huge avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  av-minimum-height av-minimum-height-20  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='20'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><a href='#next-section' title='' class='scroll-down-link ' aria-hidden='true' data-av_icon='\ue877' data-av_iconfont='entypo-fontello'><\/a><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1025'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_fifth-516b7eac7a9c6cd1b746245801c7486c av_one_fifth  avia-builder-el-1  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div '   ><\/div><div class='flex_column av-av_three_fifth-f73a11ccd29996a2a11249d534554c23 av_three_fifth  avia-builder-el-2  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-fd539869d5880d7ce82d366f471d0744\">\n#top .av-special-heading.av-av_heading-fd539869d5880d7ce82d366f471d0744{\npadding-bottom:10px;\ncolor:#ffffff;\nfont-size:60px;\n}\n.av-special-heading.av-av_heading-fd539869d5880d7ce82d366f471d0744 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-fd539869d5880d7ce82d366f471d0744 av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-3  el_before_av_hr  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Automated Incident Response<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-b90e2e68e8ea02287379d33e91bdedea\">\n#top .hr.av-av_hr-b90e2e68e8ea02287379d33e91bdedea{\nmargin-top:40px;\nmargin-bottom:40px;\n}\n.hr.av-av_hr-b90e2e68e8ea02287379d33e91bdedea .hr-inner{\nwidth:50px;\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='hr av-av_hr-b90e2e68e8ea02287379d33e91bdedea hr-custom  avia-builder-el-4  el_after_av_heading  avia-builder-el-last  hr-center hr-icon-no '><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><div class='flex_column av-av_one_fifth-f73a11ccd29996a2a11249d534554c23 av_one_fifth  avia-builder-el-5  el_after_av_three_fifth  avia-builder-el-last  flex_column_div '   ><\/div>\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-c57ab61673851e3f626556a41b4e5c15\">\n.avia-section.av-av_section-c57ab61673851e3f626556a41b4e5c15{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-av_section-c57ab61673851e3f626556a41b4e5c15 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-6  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1025'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_fifth-a93934ecd89fbb8a9566d39e89cd3725 av_one_fifth  avia-builder-el-7  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div '   ><\/div><div class='flex_column av-av_three_fifth-d06667205e6186ec8414c6eb7605d406 av_three_fifth  avia-builder-el-8  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-9b9530c8535a36616b405b20289ad5c5\">\n.av_textblock_section.av-av_textblock-9b9530c8535a36616b405b20289ad5c5 .avia_textblock{\ncolor:#3b4a73;\nfont-size:18px;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-9b9530c8535a36616b405b20289ad5c5 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p style=\"text-align: center;\">Collect evidence as soon as a security breach occurs to contain the attack and ensure evidence is not destroyed or lost. <strong>Automate<\/strong> critical evidence collection across compromised internal or cloud-hosted systems. Including memory dumps, network connections, service and process lists, requested domains, logs and changed files.<\/p>\n<\/div><\/section><\/div><div class='flex_column av-av_one_fifth-d06667205e6186ec8414c6eb7605d406 av_one_fifth  avia-builder-el-10  el_after_av_three_fifth  avia-builder-el-last  flex_column_div '   ><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-2c33eaffe6b4a721d9dd9c735fe57e37\">\n.avia-section.av-av_section-2c33eaffe6b4a721d9dd9c735fe57e37{\nmargin-top:0px0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-av_section-2c33eaffe6b4a721d9dd9c735fe57e37 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-11  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1025'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_one_half-1ca22399d877b927d873af939ca1b3bf sc-av_one_half av-equal-height-column-flextable'><div class='flex_column av-av_one_half-1ca22399d877b927d873af939ca1b3bf av_one_half  avia-builder-el-12  el_before_av_one_half  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-middle '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-eadb07e24a8dbde49c7ae373324cbae6\">\n#top .av-special-heading.av-av_heading-eadb07e24a8dbde49c7ae373324cbae6{\npadding-bottom:10px;\nfont-size:25px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-eadb07e24a8dbde49c7ae373324cbae6 av-special-heading-h3 blockquote modern-quote  avia-builder-el-13  el_before_av_textblock  avia-builder-el-first  av-thin-font av-inherit-size '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Automated Incident Response<strong><\/h3><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><\/strong><\/strong><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82\">\n.av_textblock_section.av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p>Automatically analyze security breach evidence collected using specialist security techniques. Identify a range of malicious indicators, including hidden or rogue processes, suspicious files and registry entries, backdoor persistence techniques, as well as malicious DNS requests and network connections.<\/p>\n<p>This automated analysis may then be used to automatically respond to the threat or provide incident responders with fast and effective actionable intelligence to manage the breach and the communications with their organization and customers.<\/p>\n<\/div><\/section><\/div><div class='av-flex-placeholder'><\/div><div class='flex_column av-av_one_half-838c76ee294fa093a17e94dc54512b24 av_one_half  avia-builder-el-15  el_after_av_one_half  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_image-cd988e88b3111c738d7166026a43a42a\">\n.avia-image-container.av-av_image-cd988e88b3111c738d7166026a43a42a .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-av_image-cd988e88b3111c738d7166026a43a42a av-styling- avia-align-center  avia-builder-el-16  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1028 avia-img-lazy-loading-not-1028 avia_image' src=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/analyze-security.png\" alt='analyze-security' title='analyze-security'  height=\"359\" width=\"690\"  itemprop=\"thumbnailUrl\" srcset=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/analyze-security.png 690w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/analyze-security-300x156.png 300w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/><\/div><\/div><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-2c33eaffe6b4a721d9dd9c735fe57e37\">\n.avia-section.av-av_section-2c33eaffe6b4a721d9dd9c735fe57e37{\nmargin-top:0px0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-av_section-2c33eaffe6b4a721d9dd9c735fe57e37 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-17  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1025'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_two_third-3b9beb5a1591c5269e54b51e9cc477e0 sc-av_two_third av-mobile-columns-flex av-columns-reverse av-equal-height-column-flextable'><div class='flex_column av-av_two_third-3b9beb5a1591c5269e54b51e9cc477e0 av_two_third  avia-builder-el-18  el_before_av_one_third  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_image-602bee62665736fa9b7de34317b0e2a4\">\n.avia-image-container.av-av_image-602bee62665736fa9b7de34317b0e2a4 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-av_image-602bee62665736fa9b7de34317b0e2a4 av-styling- avia-align-center  avia-builder-el-19  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1033 avia-img-lazy-loading-not-1033 avia_image' src=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Automated-Incident-Response-Diagram.png\" alt='Automated Incident Response Diagram' title='Automated Incident Response Diagram'  height=\"369\" width=\"780\"  itemprop=\"thumbnailUrl\" srcset=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Automated-Incident-Response-Diagram.png 780w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Automated-Incident-Response-Diagram-300x142.png 300w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Automated-Incident-Response-Diagram-768x363.png 768w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Automated-Incident-Response-Diagram-705x334.png 705w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/div><\/div><\/div><\/div><div class='av-flex-placeholder'><\/div><div class='flex_column av-av_one_third-514a4b1d4425913d420bafde95362182 av_one_third  avia-builder-el-20  el_after_av_two_third  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82\">\n.av_textblock_section.av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><ul style=\"font-weight: 500;\">\n<li>Automated Incident detection, response evidence collection, evidence analysis and response action<\/li>\n<li>Automation authorization through SLACK<\/li>\n<li>Minimization of time to detect and respond<\/li>\n<li>Cost saving through automation of response and risk minimization<\/li>\n<\/ul>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-ddd73e2fe09087c8ea863684c2d4efb0\">\n.avia-section.av-av_section-ddd73e2fe09087c8ea863684c2d4efb0{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-av_section-ddd73e2fe09087c8ea863684c2d4efb0 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-22  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1025'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_fifth-a93934ecd89fbb8a9566d39e89cd3725 av_one_fifth  avia-builder-el-23  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div '   ><\/div><div class='flex_column av-av_three_fifth-d06667205e6186ec8414c6eb7605d406 av_three_fifth  avia-builder-el-24  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div '   ><div  class='avia-video av-av_video-863dc1d89850a327ab3948e27face973 avia-video-16-9 av-lazyload-immediate av-lazyload-video-embed '  itemprop=\"video\" itemtype=\"https:\/\/schema.org\/VideoObject\"  data-original_url='https:\/\/www.youtube.com\/watch?v=InK1ylqU2EE'><script type='text\/html' class='av-video-tmpl'><div class='avia-iframe-wrap'><iframe title=\"Getting Started with Evolve Automated Compromised Account Monitoring\" width=\"1500\" height=\"844\" src=\"https:\/\/www.youtube.com\/embed\/InK1ylqU2EE?feature=oembed&autoplay=1&loop=1&controls=0&mute=1&playlist=InK1ylqU2EE\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div><\/script><div class='av-click-to-play-overlay'><div class=\"avia_playpause_icon\"><\/div><\/div><\/div><\/div><div class='flex_column av-av_one_fifth-d06667205e6186ec8414c6eb7605d406 av_one_fifth  avia-builder-el-26  el_after_av_three_fifth  avia-builder-el-last  flex_column_div '   ><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-f7a622a192eb4e7c4953e9c0865ff204\">\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204{\nmargin-top:20px;\nmargin-bottom:0px;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/pexels-eduardo-dutra-2115217.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-section-color-overlay{\nopacity:0.5;\nbackground-color:#ffffff;\n}\n<\/style>\n<div id='av_section_6'  class='avia-section av-av_section-f7a622a192eb4e7c4953e9c0865ff204 main_color avia-section-default avia-no-border-styling  avia-builder-el-27  el_after_av_section  avia-builder-el-last  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  container_wrap fullsize'  data-section-bg-repeat='stretch'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1025'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_full-516b7eac7a9c6cd1b746245801c7486c av_one_full  avia-builder-el-28  avia-builder-el-no-sibling  first flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-8677320905dc9bdec3e6c88e4c576590\">\n#top .av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590{\npadding-bottom:10px;\ncolor:#000000;\nfont-size:40px;\n}\n.av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590 .special-heading-inner-border{\nborder-color:#000000;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-8677320905dc9bdec3e6c88e4c576590 av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-29  el_before_av_button  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Get in touch with us and receive more information on how it can help you<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n<div  class='avia-button-wrap avia-button-center  avia-builder-el-30  el_after_av_heading  avia-builder-el-last ' ><a href='http:\/\/www.cyberdna.com.au\/cyber-automation\/contact\/'  class='avia-button av-av_button-4869be09c2e71144d3515a4d55b0849a avia-icon_select-no avia-size-large avia-position-center avia-color-theme-color ' ><span class='avia_iconbox_title' >Contact<\/span><\/a><\/div><\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1025"}],"collection":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/comments?post=1025"}],"version-history":[{"count":31,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1025\/revisions"}],"predecessor-version":[{"id":1454,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1025\/revisions\/1454"}],"wp:attachment":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/media?parent=1025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}