  {"id":14761,"date":"2016-11-15T22:02:21","date_gmt":"2016-11-16T03:02:21","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/"},"modified":"2016-11-15T22:02:21","modified_gmt":"2016-11-16T03:02:21","slug":"root9bs-specialized-approach-to-cybersecurity","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/","title":{"rendered":"root9B\u2019s Specialized Approach to Cybersecurity"},"content":{"rendered":"<p><strong>Cyberattack: 21<sup>st<\/sup> Century Threat<\/strong><\/p>\n<p>Digitization has connected the world more than ever. In 2016, 6.4 billion digital items will be interconnected, while spending on the Internet of Things [\u201cIOT\u201d] will total $235 billion worldwide, representing 30% and 22% increases over 2015, respectively.<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> Cyberattacks on connected systems represent a threat to businesses, governments, financial systems, utilities, and consumers. Nefarious attacks are increasing at an exponential frequency.<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a> On October 21, 2016, hackers shut down websites such as Twitter, Netflix, CNN and others in the U.S. and Europe, representing the largest Distributed Denial of Service [\u201cDDoS\u201d] attack in history.<a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a> The U.S. government is not immune to cyberattacks, with the 2015 data breach of the Office of Personnel Management [\u201cOPM\u201d] leading to the loss of 21.5 million stolen records and director Katherine Archuleta\u2019s resignation.<a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cybersecurity: Opportunity for root9B<\/strong><\/p>\n<p>Eric Hipkins founded root9B in 2011 as the cyber division of root9b Technologies to combat cyberattacks for commercial customers and federal and local governments.<a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a> root9B hired leadership and technical teams with substantial experience in the U.S. Department of Defense [\u201cDoD\u201d], where they fought off attacks from the \u201cnation-state cyber actors\u201d that represent the greatest threat to both businesses and governments.<a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a> According to root9B, the average time that a cyber intruder spends in an organization\u2019s network before detection is 229 days, during which time the hacker \u201centers and stays hidden while extracting information of value.\u201d<a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a> The core of the company\u2019s product offering is a subscription for Manned Information Security, in which root9B\u2019s ex-DoD employees identify potential vulnerabilities and monitor those vulnerabilities 24\/7\/365 for potential intrusion. After detecting an intruder, root9B\u2019s Adversary Pursuit Center proactively defends the customer\u2019s network to neutralize the hacker before he or she can extract any information.<sup>8<\/sup> root9B also offers training to customers\u2019 security and risk management professionals.<sup>8<\/sup><\/p>\n<p>Although still a small company, root9B\u2019s unique, human-centered aggressive intrusion defense product has drawn the attention of industry experts and customers. Cybersecurity Ventures named root9B its #1 company in the Cybersecurity 500, root9B\u2019s fourth consecutive quarter at #1.<a href=\"#_ftn8\" name=\"_ftnref8\">[8]<\/a> Commercial businesses and government organizations are also seeing the power of root9B\u2019s product offering. In April, the company signed a \u201cmulti-year, $2.8mm contract with a leading financial institution.\u201d<a href=\"#_ftn9\" name=\"_ftnref9\">[9]<\/a> root9B\u2019s core customer base, however, remains government and public institutions, evidenced by $12mm of contracts signed in 2016 with the Department of Defense,<a href=\"#_ftn10\" name=\"_ftnref10\">[10]<\/a> the U.S. Air Force Academy,<a href=\"#_ftn11\" name=\"_ftnref11\">[11]<\/a> and U.S. CYBER COMMAND,<a href=\"#_ftn12\" name=\"_ftnref12\">[12]<\/a> among many others.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Challenges and Next Steps for root9B<\/strong><\/p>\n<p>root9B has created a unique, exciting business model with a highly specialized product offering in a vastly growing market. Cybersecurity Ventures projects spending on cybersecurity to balloon to $1 trillion from 2017-2021, and cybercrime will cost the world $6 trillion annually by 2021.<a href=\"#_ftn13\" name=\"_ftnref13\">[13]<\/a> root9B is therefore well-positioned to take advantage of the growing cybersecurity trend.<\/p>\n<p>root9B must overcome two current challenges in the coming years: small scale and scalability of its business model. The company is a tiny, albeit cutting edge, player in the cybersecurity market today, and it needs to gain market share with commercial customers such as financial institutions who have trillions of dollars vulnerable to hackers. root9B must also determine how to scale its business. Currently, the company employs eighty<sup>11<\/sup> with elite backgrounds in DoD cybersecurity. It will be hard to continue to hire such talented employees from a small talent pool, so the company must build a less-manual, yet still effective, product offering to sell to all but its most vulnerable customers.<\/p>\n<p>&nbsp;<\/p>\n<p>(Word Count: 758)<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> \u201cGartner Says 6.4 Billion Connected &#8220;Things&#8221; Will Be in Use in 2016, Up 30 Percent From 2015,\u201d Gartner, Inc., November 10, 2015.<\/p>\n<p><a href=\"http:\/\/www.gartner.com\/newsroom\/id\/3165317\">http:\/\/www.gartner.com\/newsroom\/id\/3165317<\/a><\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> \u201cThe Growing Threat of Cyber-Attacks on Critical Infrastructure,\u201d Daniel Wagner and Bailey Schweitzer, Huffington Post, May 24, 2015.<\/p>\n<p><a href=\"http:\/\/www.huffingtonpost.com\/daniel-wagner\/the-growing-threat-of-cyb_b_10114374.html\">http:\/\/www.huffingtonpost.com\/daniel-wagner\/the-growing-threat-of-cyb_b_10114374.html<\/a><\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> \u201cDDoS attack that disrupted internet was largest of its kind in history, experts say,\u201d Nicky Woolf, The Guardian, October 26, 2016.<\/p>\n<p><a href=\"https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet\">https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet<\/a><\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> \u201cA look at recent data breaches and how the government is reacting,\u201d Josue Ledesma, Security Scorecard Insights &amp; News, April 14, 2016.<\/p>\n<p><a href=\"http:\/\/blog.securityscorecard.com\/2016\/04\/14\/big-us-government-cybersecurity-problem\/\">http:\/\/blog.securityscorecard.com\/2016\/04\/14\/big-us-government-cybersecurity-problem\/<\/a><\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> \u201cCompany Overview of Root9B LLC,\u201d Bloomberg.<\/p>\n<p><a href=\"http:\/\/www.bloomberg.com\/research\/stocks\/private\/snapshot.asp?privcapId=251856208\">http:\/\/www.bloomberg.com\/research\/stocks\/private\/snapshot.asp?privcapId=251856208<\/a><\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> \u201croot9B: About,\u201d root9B.<\/p>\n<p><a href=\"https:\/\/www.root9b.com\/about\">https:\/\/www.root9b.com\/about<\/a><\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> \u201croot9B: Services,\u201d root9B.<\/p>\n<p><a href=\"https:\/\/www.root9b.com\/services\">https:\/\/www.root9b.com\/services<\/a><\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> \u201cWorld\u2019s Hottest Cybersecurity Companies to Watch in 2017,\u201d Cybersecurity Ventures, November 15, 2016.<\/p>\n<p><a href=\"http:\/\/cybersecurityventures.com\/press-release-cybersecurity-500-q4-2016-edition\/\">http:\/\/cybersecurityventures.com\/press-release-cybersecurity-500-q4-2016-edition\/<\/a><\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> \u201croot9B Announces Strategic Cyber Defense Contract with Financial Institution,\u201d PR Newswire, April 6, 2016.<\/p>\n<p><a href=\"http:\/\/www.prnewswire.com\/news-releases\/root9b-announces-strategic-cyber-defense-contract-with-financial-institution-300246805.html\">http:\/\/www.prnewswire.com\/news-releases\/root9b-announces-strategic-cyber-defense-contract-with-financial-institution-300246805.html<\/a><\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> \u201croot9B Awarded Department of Defense and Critical Infrastructure Contracts,\u201d root9B Press Release, root9B, October 20, 2016.<\/p>\n<p><a href=\"https:\/\/www.root9b.com\/newsroom\/root9b-awarded-department-defense-and-critical-infrastructure-contracts\">https:\/\/www.root9b.com\/newsroom\/root9b-awarded-department-defense-and-critical-infrastructure-contracts<\/a><\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> \u201cColorado Springs Company Joins Forces with Academy to Counter Cyberattacks,\u201d root9B Press Release, root9B, November 1, 2016.<\/p>\n<p><a href=\"https:\/\/www.root9b.com\/newsroom\/colorado-springs-company-joins-forces-academy-counter-cyberattacks\">https:\/\/www.root9b.com\/newsroom\/colorado-springs-company-joins-forces-academy-counter-cyberattacks<\/a><\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\">[12]<\/a> \u201croot9B Awarded Subcontract Supporting U.S. CYBER COMMAND,\u201d PR Newswire, June 3, 2016.<\/p>\n<p><a href=\"http:\/\/www.prnewswire.com\/news-releases\/root9b-awarded-subcontract-supporting-us-cyber-command-300279236.html\">http:\/\/www.prnewswire.com\/news-releases\/root9b-awarded-subcontract-supporting-us-cyber-command-300279236.html<\/a><\/p>\n<p><a href=\"#_ftnref13\" name=\"_ftn13\">[13]<\/a> \u201cCybersecurity Market Report,\u201d Editors at Cybersecurity Ventures, Cybersecurity Ventures, Q3 2016.<\/p>\n<p><a href=\"http:\/\/cybersecurityventures.com\/cybersecurity-market-report\/\">http:\/\/cybersecurityventures.com\/cybersecurity-market-report\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattack: 21st Century Threat Digitization has connected the world more than ever. In 2016, 6.4 billion digital items will be interconnected, while spending on the Internet of Things [\u201cIOT\u201d] will total $235 billion worldwide, representing 30% and 22% increases over [&hellip;]<\/p>\n","protected":false},"author":1854,"featured_media":14771,"comment_status":"open","ping_status":"closed","template":"","categories":[],"class_list":["post-14761","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/digitization-challenge-2016\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>root9B\u2019s Specialized Approach to Cybersecurity - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"root9B\u2019s Specialized Approach to Cybersecurity - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"Cyberattack: 21st Century Threat Digitization has connected the world more than ever. In 2016, 6.4 billion digital items will be interconnected, while spending on the Internet of Things [\u201cIOT\u201d] will total $235 billion worldwide, representing 30% and 22% increases over [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Capture-26.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1309\" \/>\n\t<meta property=\"og:image:height\" content=\"498\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/root9bs-specialized-approach-to-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/root9bs-specialized-approach-to-cybersecurity\\\/\",\"name\":\"root9B\u2019s Specialized Approach to Cybersecurity - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/root9bs-specialized-approach-to-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/root9bs-specialized-approach-to-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Capture-26.png\",\"datePublished\":\"2016-11-16T03:02:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/root9bs-specialized-approach-to-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/root9bs-specialized-approach-to-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/root9bs-specialized-approach-to-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Capture-26.png\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Capture-26.png\",\"width\":1309,\"height\":498},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/root9bs-specialized-approach-to-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"root9B\u2019s Specialized Approach to Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"root9B\u2019s Specialized Approach to Cybersecurity - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"root9B\u2019s Specialized Approach to Cybersecurity - Technology and Operations Management","og_description":"Cyberattack: 21st Century Threat Digitization has connected the world more than ever. In 2016, 6.4 billion digital items will be interconnected, while spending on the Internet of Things [\u201cIOT\u201d] will total $235 billion worldwide, representing 30% and 22% increases over [&hellip;]","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/","og_site_name":"Technology and Operations Management","og_image":[{"width":1309,"height":498,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Capture-26.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/","name":"root9B\u2019s Specialized Approach to Cybersecurity - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Capture-26.png","datePublished":"2016-11-16T03:02:21+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Capture-26.png","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Capture-26.png","width":1309,"height":498},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/root9bs-specialized-approach-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"root9B\u2019s Specialized Approach to Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/14761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/1854"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=14761"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/14761\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/14771"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=14761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=14761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}