
{"id":2019,"date":"2012-08-27T00:00:00","date_gmt":"2012-08-27T00:00:00","guid":{"rendered":"http:\/\/otava.test\/incident-response-and-2012-cyber-threats-security\/"},"modified":"2012-08-27T00:00:00","modified_gmt":"2012-08-27T00:00:00","slug":"incident-response-and-2012-cyber-threats-security","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/","title":{"rendered":"Incident Response and 2012 Cyber Threats &#038; Security"},"content":{"rendered":"<p>Join us for an interactive webinar on cyber threats, security and incident response on Tuesday, September 11 with Darek Dabbs, VP of Information Security at Sera-Brynn and April Sage, Director of Healthcare Vertical and Marketing at Online Tech.<\/p>\n<p><strong>When<\/strong>: September 11, 2012 @ 2 P.M. ET<br \/>\n<strong>Where<\/strong>: Online &#8211;\u00a0<a href=\"https:\/\/www4.gotomeeting.com\/register\/704539271\">Register with GoToMeeting<\/a><br \/>\n<strong>Who<\/strong>: Darek Dabbs, VP of Information Security at Sera-Brynn and April Sage, Director of Healthcare Vertical and Marketing at Online Tech<br \/>\n<strong>What<\/strong>: Incident Response and 2012 Cyber Threats &amp; Security<br \/>\n<strong>Description<\/strong>: Join Online Tech and Darek Dabbs, CSSP\/PCI-QSA, VP of Information Security at Sera-Brynn for a discussion on the latest known security threats and incident response methods.<\/p>\n<p>Sera-Bynn is PCI certified, cyber security company staffed with members from the National Intelligence and Military Information Security communities. This webinar will feature the expertise of top technical security and <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/pci-compliant-cloud\/\">PCI hosting<\/a> leaders with a chance to answer your questions after the presentation. <a href=\"https:\/\/www4.gotomeeting.com\/register\/704539271\">Sign up to attend<\/a> and submit questions in advance!<\/p>\n<p>Online Tech is also hosting a <a href=\"https:\/\/www.onlinetech.com\/resources\/events\/seminars\/fall-into-it\">Fall into IT<\/a> tech seminar with sessions on compliance, security, mobile health apps, BYOD (Bring Your Own Device) environments, and more. While this is a live event at our <a href=\"https:\/\/www.otava.com\/meet-otava\/locations\/\">Ann Arbor 2 data center<\/a>\u00a0with guided data center tours, breakfast and networking, we also plan to live-stream the presentations for everyone that would like to attend remotely. <a href=\"https:\/\/www.onlinetech.com\/resources\/events\/seminars\/fall-into-it\">Register to attend<\/a> with our online form.<\/p>\n<hr \/>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg\" alt=\"darek-dabbs\" width=\"87\" height=\"120\" \/>Darek Dabbs, CISSP\/PCI-QSA is the VP of Information Security<\/strong><\/p>\n<p>Darek Dabbs, CISSP\/PCI-QSA is the VP of Information Security at Sera-Brynn.com, a Premiere Cyber Security company located in South East Virginia. He has over 15 years\u2019 experience supporting multi-tiered and highly-classified information security efforts in both the Government and Private Sectors.<\/p>\n<hr \/>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/right-april.jpg\" alt=\"april sage\" width=\"80\" height=\"120\" \/>April Sage, CPHIMS, Director Healthcare Vertical, Online Tech<\/strong><\/p>\n<p>April Sage has been involved in the IT industry for over two decades, initially founding a technology vocational program. In 2000, April founded a bioinformatics company that supported biotech, pharma, and bioinformatic companies in the development of research portals, drug discovery search engines, and other software systems.<\/p>\n<p>Since then, April has been involved in the development and implementation of online business plans and integrated marketing strategies across insurance, legal, entertainment, and retail industries until her current position as Director Healthcare Vertical of Online Tech.<\/p>\n<p>Contact:\u00a0<a href=\"mailto:asage@onlinetech.com\">asage@onlinetech.com<\/a><\/p>\n<hr \/>\n<p>If you&#8217;re concerned with IT security and would like to learn more about how you can secure your data and applications, read our white papers. If your organization stores cardholder data, our <a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\">PCI Compliant Hosting<\/a> white paper is ideal for you. If your organization stores, collects or processes protected health information (PHI), then our <a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Compliant Hosting<\/a> white paper will provide all the required technology and guidance you need.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Join us for an interactive webinar on cyber threats, security and incident response on Tuesday, September 11 with Darek Dabbs, VP of Information Security at Sera-Brynn and April Sage, Director of Healthcare Vertical and Marketing at Online Tech. When: September 11, 2012 @ 2 P.M. ET Where: Online &#8211;\u00a0Register with GoToMeeting Who: Darek Dabbs, VP of Information Security at Sera-Brynn and April Sage, Director of Healthcare Vertical and Marketing at Online Tech What: Incident Response and 2012 Cyber Threats &amp; Security Description: Join Online Tech and Darek Dabbs, CSSP\/PCI-QSA, VP of Information Security at Sera-Brynn for a discussion on the latest known security threats and incident response methods. Sera-Bynn is PCI certified, cyber security company staffed with members from the National Intelligence and Military Information Security communities. This webinar will feature the expertise of top technical security and PCI hosting leaders with a chance to answer your questions after the presentation. Sign up to attend and submit questions in advance! Online Tech is also hosting a Fall into IT tech seminar with sessions on compliance, security, mobile health apps, BYOD (Bring Your Own Device) environments, and more. While this is a live event at our Ann Arbor 2 data center\u00a0with&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2019","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Incident Response and 2012 Cyber Threats &amp; Security | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incident Response and 2012 Cyber Threats &amp; Security\" \/>\n<meta property=\"og:description\" content=\"Join us for an interactive webinar on cyber threats, security and incident response on Tuesday, September 11 with Darek Dabbs, VP of Information Security at Sera-Brynn and April Sage, Director of Healthcare Vertical and Marketing at Online Tech. When: September 11, 2012 @ 2 P.M. ET Where: Online &#8211;\u00a0Register with GoToMeeting Who: Darek Dabbs, VP of Information Security at Sera-Brynn and April Sage, Director of Healthcare Vertical and Marketing at Online Tech What: Incident Response and 2012 Cyber Threats &amp; Security Description: Join Online Tech and Darek Dabbs, CSSP\/PCI-QSA, VP of Information Security at Sera-Brynn for a discussion on the latest known security threats and incident response methods. Sera-Bynn is PCI certified, cyber security company staffed with members from the National Intelligence and Military Information Security communities. This webinar will feature the expertise of top technical security and PCI hosting leaders with a chance to answer your questions after the presentation. Sign up to attend and submit questions in advance! Online Tech is also hosting a Fall into IT tech seminar with sessions on compliance, security, mobile health apps, BYOD (Bring Your Own Device) environments, and more. While this is a live event at our Ann Arbor 2 data center\u00a0with...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-27T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Incident Response and 2012 Cyber Threats &#038; Security\",\"datePublished\":\"2012-08-27T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/\"},\"wordCount\":449,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/\",\"url\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/\",\"name\":\"Incident Response and 2012 Cyber Threats & Security | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg\",\"datePublished\":\"2012-08-27T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Incident Response and 2012 Cyber Threats &#038; Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Incident Response and 2012 Cyber Threats & Security | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/","og_locale":"en_US","og_type":"article","og_title":"Incident Response and 2012 Cyber Threats & Security","og_description":"Join us for an interactive webinar on cyber threats, security and incident response on Tuesday, September 11 with Darek Dabbs, VP of Information Security at Sera-Brynn and April Sage, Director of Healthcare Vertical and Marketing at Online Tech. When: September 11, 2012 @ 2 P.M. ET Where: Online &#8211;\u00a0Register with GoToMeeting Who: Darek Dabbs, VP of Information Security at Sera-Brynn and April Sage, Director of Healthcare Vertical and Marketing at Online Tech What: Incident Response and 2012 Cyber Threats &amp; Security Description: Join Online Tech and Darek Dabbs, CSSP\/PCI-QSA, VP of Information Security at Sera-Brynn for a discussion on the latest known security threats and incident response methods. Sera-Bynn is PCI certified, cyber security company staffed with members from the National Intelligence and Military Information Security communities. This webinar will feature the expertise of top technical security and PCI hosting leaders with a chance to answer your questions after the presentation. Sign up to attend and submit questions in advance! Online Tech is also hosting a Fall into IT tech seminar with sessions on compliance, security, mobile health apps, BYOD (Bring Your Own Device) environments, and more. While this is a live event at our Ann Arbor 2 data center\u00a0with...","og_url":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/","og_site_name":"OTAVA","article_published_time":"2012-08-27T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Incident Response and 2012 Cyber Threats &#038; Security","datePublished":"2012-08-27T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/"},"wordCount":449,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/","url":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/","name":"Incident Response and 2012 Cyber Threats & Security | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg","datePublished":"2012-08-27T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/darek-dabbs.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/incident-response-and-2012-cyber-threats-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Incident Response and 2012 Cyber Threats &#038; Security"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2019"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2019\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2019"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}