{"id":1,"name":"daitseguridad","url":"https:\/\/iciberseguridad.io","description":"","link":"https:\/\/iciberseguridad.io\/?author=1","slug":"daitseguridad","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/99c058aef9c8716eca67e8c9eb34e3b3a9e0ddb2961c1b0056f2201f809c8012?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/99c058aef9c8716eca67e8c9eb34e3b3a9e0ddb2961c1b0056f2201f809c8012?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/99c058aef9c8716eca67e8c9eb34e3b3a9e0ddb2961c1b0056f2201f809c8012?s=96&d=mm&r=g"},"meta":[],"elementor_introduction":{"e-editor-one-notice-pointer":true},"_links":{"self":[{"href":"https:\/\/iciberseguridad.io\/index.php?rest_route=\/wp\/v2\/users\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iciberseguridad.io\/index.php?rest_route=\/wp\/v2\/users"}]}}