{"id":1343,"date":"2020-12-09T16:10:19","date_gmt":"2020-12-09T15:10:19","guid":{"rendered":"https:\/\/www.cyberinflight.com\/?page_id=1343"},"modified":"2021-06-21T14:25:06","modified_gmt":"2021-06-21T12:25:06","slug":"quarterly-digest-service","status":"publish","type":"page","link":"https:\/\/www.cyberinflight.com\/?page_id=1343","title":{"rendered":"Quarterly Digest Service"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1343\" class=\"elementor elementor-1343\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-438cd255 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"438cd255\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-63e53089\" data-id=\"63e53089\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13b14809 elementor-widget elementor-widget-heading\" data-id=\"13b14809\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Quarterly Digest Service<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5fb2bb0f\" data-id=\"5fb2bb0f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-588da417 elementor-align-right elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"588da417\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/www.cyberinflight.com\/?page_id=1309\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Subscribe<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-be4b628 elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be4b628\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-7d42016\" data-id=\"7d42016\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71f5bb6 elementor-widget elementor-widget-heading\" data-id=\"71f5bb6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Quarterly Digest Service<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b9b002 elementor-widget elementor-widget-text-editor\" data-id=\"1b9b002\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: left;\">The \u201c<strong>CyberInflight\u2019s Quarterly Digest<\/strong>\u201d, in the same vein as the yearly report, will bring a thorough and analytical approach of the market, identifying the latest trends, describing the most recent cyberattacks, and summarizing the essential and strategic information necessary for better decision making.<\/p>\n<p>Each quarter the focus will be set on a specific topic according to the recommendations made in through this email address:<\/p>\n<p><span style=\"color: var( --e-global-color-text ); font-size: 1rem;\"><b><i>digest@cyberinflight.com<\/i><\/b><\/span><\/p>\n<p>Customer gets access to each already published Quarterly Digest when registering to the service.<\/p>\n<div><br><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-afe7758\" data-id=\"afe7758\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed77eab elementor-widget elementor-widget-image\" data-id=\"ed77eab\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"864\" height=\"642\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/12\/Quarterly-digest-service.png\" class=\"attachment-full size-full wp-image-1442\" alt=\"\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/12\/Quarterly-digest-service.png 864w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/12\/Quarterly-digest-service-300x223.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/12\/Quarterly-digest-service-768x571.png 768w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c6c0c9 elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9c6c0c9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-5e77ebb\" data-id=\"5e77ebb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e8ca985 elementor-widget elementor-widget-heading\" data-id=\"e8ca985\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Q3 2020: Regulatory landscape<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-879f686 elementor-widget elementor-widget-text-editor\" data-id=\"879f686\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: bold;\">I. Regulatory framework<\/span><\/p><ul><li>ICAO\u2019s Cybersecurity Strategy<\/li><li>ICAO\u2019s Assembly Resolution A40-10<\/li><li>IATA\u2019s Aviation Cyber Security Position Paper<\/li><li>IATA\u2019s Compilation of Cyber Security Regulations, Standards, and Guidance<\/li><li>Takeaways on the current regulatory framework<\/li><li>Takeaways on the current regulatory framework<\/li><\/ul><p><br \/><span style=\"font-weight: bold;\">II. Threat Intelligence<\/span><\/p><ul id=\"block-af3c088a-e7c7-493d-a6cc-4220cd18fa0b\"><li>Noticeable facts for Q3 2020 (1\/3)(2\/3))(3\/3)<\/li><\/ul><p><span style=\"font-weight: bold;\">III. Food for thoughts<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-eaae9b0\" data-id=\"eaae9b0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fc9780 elementor-widget elementor-widget-image\" data-id=\"6fc9780\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1288\" height=\"522\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Snapshot.png\" class=\"attachment-full size-full wp-image-1253\" alt=\"\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Snapshot.png 1288w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Snapshot-300x122.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Snapshot-1024x415.png 1024w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Snapshot-768x311.png 768w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bf88baf elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf88baf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-a417f16\" data-id=\"a417f16\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b3f1455 elementor-widget elementor-widget-heading\" data-id=\"b3f1455\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Q2 2020: Dark Web<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d68e85 elementor-widget elementor-widget-text-editor\" data-id=\"3d68e85\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<strong>I. Dark Web: Facts and Myths<\/strong>\n<ul>\n<li>Introduction<\/li>\n<li>A dive in the Dark Web<\/li>\n<li>Its users<\/li>\n<li>Its usage<\/li>\n<li>Recent soar of blogs leaking corporate data<\/li>\n<li>Operating mode of ransomware groups<\/li>\n<li>Examples of ransomware groups communications<\/li>\n<li>Aerospace related information on the Dark Web<\/li>\n<\/ul>\n<strong>II. Threat\u00a0Intelligence<\/strong>\n<ul>\n \t<li>Noticeable facts for Q2 2020 (1\/2)<\/li>\n \t<li>Noticeable facts for Q2 2020 (2\/2)<\/li>\n<\/ul>\n<strong>III. Food\u00a0for thoughts:<\/strong>\n<ul>\n \t<li>Creation of a Principal-Agent problem<\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ad48724\" data-id=\"ad48724\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-484e19b elementor-widget elementor-widget-image\" data-id=\"484e19b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1110\" height=\"447\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/07\/Digest-Q2.png\" class=\"attachment-full size-full wp-image-1135\" alt=\"\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/07\/Digest-Q2.png 1110w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/07\/Digest-Q2-300x121.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/07\/Digest-Q2-1024x412.png 1024w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/07\/Digest-Q2-768x309.png 768w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2da5507 elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2da5507\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-532c177\" data-id=\"532c177\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf56c36 elementor-widget elementor-widget-heading\" data-id=\"cf56c36\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Q1 2020: Cyber-Insurance<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ac9876 elementor-widget elementor-widget-text-editor\" data-id=\"2ac9876\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<strong>I. Cyber-insurance<\/strong>\n<ul>\n \t<li>Introduction<\/li>\n \t<li>Chronology of cyber-insurance<\/li>\n \t<li>Defining the cyber-risk<\/li>\n \t<li>Stakeholders and their influence<\/li>\n \t<li>Link between turnover and exposure<\/li>\n \t<li>Link between turnover and attack motive<\/li>\n \t<li>Miscellaneous<\/li>\n \t<li>Must reads on cyber insurance<\/li>\n<\/ul>\n<strong>II. Threat\u00a0Intelligence<\/strong>\n<li>Noticeable facts for Q1 2020 (1\/2)<\/li>\n \t<li>Noticeable facts for Q1 2020 (2\/2)<\/li>\n<\/ul>\n<br>\n<strong>III. Food\u00a0for thoughts:<\/strong>\n<ul>\n \t<li>Systemic cyber attack scenario<\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-a949d29\" data-id=\"a949d29\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e17e10c elementor-widget elementor-widget-image\" data-id=\"e17e10c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1273\" height=\"713\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/04\/Q1_Digest.png\" class=\"attachment-full size-full wp-image-1051\" alt=\"\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/04\/Q1_Digest.png 1273w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/04\/Q1_Digest-300x168.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/04\/Q1_Digest-1024x574.png 1024w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/04\/Q1_Digest-768x430.png 768w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ebecc45 elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ebecc45\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-eb86030\" data-id=\"eb86030\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f15913 elementor-widget elementor-widget-heading\" data-id=\"9f15913\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Quarterly Digest Service<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1267f2 elementor-widget elementor-widget-text-editor\" data-id=\"e1267f2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>1 year registration<br>Publication date: Q1, Q2, Q3, Q4<br>Public price:<br>User licence: \u20ac800*<br>Enterprise licence: \u20ac1,500*<br>Report in PDF format with supporting files<\/p>\n<p>Each quarter is about 15 pages long.&nbsp;<\/p>\n<p>* Prices are quoted in euros<br>* VAT not applicable, art. 293B of the CGI<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1ea592c\" data-id=\"1ea592c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03b53ff elementor-widget elementor-widget-image\" data-id=\"03b53ff\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1836\" height=\"716\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic.png\" class=\"attachment-full size-full wp-image-552\" alt=\"\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic.png 1836w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic-300x117.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic-768x300.png 768w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic-1024x399.png 1024w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Quarterly Digest Service Subscribe Quarterly Digest Service The \u201cCyberInflight\u2019s Quarterly Digest\u201d, in the same vein as the yearly report, will bring a thorough and analytical approach of the market, identifying the latest trends, describing the most recent cyberattacks, and summarizing the essential and strategic information necessary for better decision making. Each quarter the focus will &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.cyberinflight.com\/?page_id=1343\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Quarterly Digest Service&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1343","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/1343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1343"}],"version-history":[{"count":92,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/1343\/revisions"}],"predecessor-version":[{"id":1610,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/1343\/revisions\/1610"}],"wp:attachment":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}