{"id":6,"count":1,"description":"Veille et analyses sur les menaces, vuln\u00e9rabilit\u00e9s, outils de d\u00e9fense, audits, protocoles de s\u00e9curit\u00e9 et bonnes pratiques en cybers\u00e9curit\u00e9, autre.","link":"https:\/\/leblogtech.romain-s.fr\/index.php\/category\/cybersecurite\/","name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite","taxonomy":"category","parent":0,"meta":[],"_links":{"self":[{"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/categories\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/taxonomies\/category"}],"wp:post_type":[{"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/posts?categories=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}