{"id":12604,"date":"2024-10-23T14:55:56","date_gmt":"2024-10-23T14:55:56","guid":{"rendered":"https:\/\/logient.com\/?post_type=service&#038;p=12604"},"modified":"2025-06-20T13:26:18","modified_gmt":"2025-06-20T13:26:18","slug":"cybersecurity","status":"publish","type":"service","link":"https:\/\/logient.com\/en\/service\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<section class=\"section  section-tabs auto background-color-black \"\n    >\n<div class=\"container-pd\">\n    <div class=\"tabs row \">\n        <div class=\"col-lg-5\">\n            <div class=\"flex-column-56\">\n                                    <h2 class=\"h2\">A Comprehensive  Approach to Cybersecurity  and Risk Management<\/h2>\n                            <\/div>\n        <\/div>\n        <div class=\"offset-lg-1 col-lg-6\">\n            <div class=\"tab-content\">\n                <div class=\"tab-content-item active\">\n                    <div class=\"flex-column-56\">\n                                                <div class=\"flex-column-24 \">\n                    \n            <div class=\"block-level flex-column-24\">\n                    <div class=\"block-level-title largeText\">Ensure business\u2028continuity<\/div>\n                          <div class=\"block-level-progress\"><\/div>\n        <\/div>\n                    \n            <div class=\"block-level flex-column-24\">\n                    <div class=\"block-level-title largeText\">Protect your investments and reputation<\/div>\n                          <div class=\"block-level-progress\"><\/div>\n        <\/div>\n                    \n            <div class=\"block-level flex-column-24\">\n                    <div class=\"block-level-title largeText\">Achieve compliance<\/div>\n                          <div class=\"block-level-progress\"><\/div>\n        <\/div>\n            <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n<\/section>\n\n\n<section class=\"section  section-tabs auto  \"\n    >\n<div class=\"container-pd\">\n    <div class=\" row align-items-center\">\n        <div class=\"col-lg-12 \">\n            <div class=\"flex-column-56\">\n                <div class=\"flex-column-24\" >\n                    <h2 class=\"h2\">Pen Tests<\/h2>\n                    <div class=\"defaultText\"><\/div>\n                <\/div>\n                <div class=\"row\">\n                  <div class=\"steps grid-2\">\n                                          <div class=\"flex-column-24 \">\n                                                                          <div class=\"defaultText flex-column-20 wisiwyg\"><p>Simulate real-world cyber attacks periodically to evaluate defenses, identify exploitable vulnerabilities through intrusive methods, and improve your organization\u2019s overall security posture.<\/p>\n<\/div>\n                                              <\/div>\n                                                              <div class=\"flex-column-24\">\n                                                                          <div class=\"defaultText flex-column-20 wisiwyg\"><ul>\n<li>Strengthen your resilience<\/li>\n<li>Identify critical vulnerabilities<\/li>\n<li>Improve overall security<\/li>\n<\/ul>\n<\/div>\n                                              <\/div>\n                                      <\/div>\n                <\/div>\n                          <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n<\/section>\n\n<section class=\"section  section-tabs auto  \"\n    >\n<div class=\"container-pd\">\n    <div class=\" row align-items-center\">\n        <div class=\"col-lg-12 \">\n            <div class=\"flex-column-56\">\n                <div class=\"flex-column-24\" >\n                    <h2 class=\"h2\">Vulnerability Scans<\/h2>\n                    <div class=\"defaultText\"><\/div>\n                <\/div>\n                <div class=\"row\">\n                  <div class=\"steps grid-2\">\n                                          <div class=\"flex-column-24 \">\n                                                                          <div class=\"defaultText flex-column-20 wisiwyg\"><p>Perform non-intrusive, automated scans to regularly detect and address potential security weaknesses, ensuring ongoing protection against emerging threats and vulnerabilities.<\/p>\n<\/div>\n                                              <\/div>\n                                                              <div class=\"flex-column-24\">\n                                                                          <div class=\"defaultText flex-column-20 wisiwyg\"><ul>\n<li><strong>Continuous protection<\/strong><\/li>\n<li><strong>Risk reduction<\/strong><\/li>\n<li><strong>Optimize your compliance<\/strong><\/li>\n<\/ul>\n<\/div>\n                                              <\/div>\n                                      <\/div>\n                <\/div>\n                          <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n<\/section>\n\n\n\n<section class=\"section  section-tabs auto n_columns background-color-gray \"\n    >\n<div class=\"container-pd\">\n            <div class=\" row steps_column\">\n            <div class=\"col-lg-8\">\n                <div class=\"flex-column-56\" >\n                    <h2 class=\"h2\">Our Pen Tests Packages<\/h2>\n                <\/div>\n            <\/div>\n            <div class=\"col-lg-12\">\n                              <div class=\" steps grid-3 padd-0 \">\n                                      <div class=\" flex-column-56\">\n                      <div class=\"step step_column flex-column-24\">\n                                                  <h3 class=\"h3\">Essential<\/h3>\n                                                                          <div class=\"defaultText\">Up to 60% of vulnerabilities<br \/>\r\n<br \/>\r\nKickoff Meeting<br \/>\r\nAutomated Penetration Testing (Production)<br \/>\r\nVulnerability Scanning (Production)<br \/>\r\nFalse Positives Validation<br \/>\r\nReport with Results and Recommendations<\/div>\n                                              <\/div>\n                    <\/div>\n                                      <div class=\" flex-column-56\">\n                      <div class=\"step step_column flex-column-24\">\n                                                  <h3 class=\"h3\">Standard<\/h3>\n                                                                          <div class=\"defaultText\">Up to 85% of vulnerabilities<br \/>\r\n<br \/>\r\nKickoff Meeting<br \/>\r\nAutomated Penetration Testing (Production)<br \/>\r\nVulnerability Scanning (Production)<br \/>\r\nFalse Positives Validation<br \/>\r\nReport with Results and Recommendations<br \/>\r\n+ Meeting and Report Presentation<br \/>\r\n+ Manual Penetration Testing (Production)<br \/>\r\n+ OWASP Top 10<br \/>\r\n+ Load Testing &#8211; Denial of Service (DoS)<\/div>\n                                              <\/div>\n                    <\/div>\n                                      <div class=\" flex-column-56\">\n                      <div class=\"step step_column flex-column-24\">\n                                                  <h3 class=\"h3\">Advanced<\/h3>\n                                                                          <div class=\"defaultText\">Up to 95% of vulnerabilities<br \/>\r\n<br \/>\r\nKickoff Meeting<br \/>\r\nAutomated Penetration Testing (Production)<br \/>\r\nVulnerability Scanning (Production)<br \/>\r\nFalse Positives Validation<br \/>\r\nReport with Results and Recommendations <br \/>\r\nMeeting and Report Presentation<br \/>\r\nManual Penetration Testing (Production)<br \/>\r\nOWASP Top 10<br \/>\r\nLoad Testing &#8211; Denial of Service (DoS)<br \/>\r\n+ Dark Web Domain Search<br \/>\r\n+ API Testing (Production)<\/div>\n                                              <\/div>\n                    <\/div>\n                                  <\/div>\n                          <\/div>\n        <\/div>\n    \n<\/div>\n\n<\/section>\n\n<section class=\"section  section-text-center-grid-images auto grid-imgs-section  \"\n    >\n<div class=\"container-pd\">\n          <div class=\" row align-items-center\">\n            <div class=\"col-lg-12 \">\n                <div class=\"flex-column-56\" style=\"text-align:center;\">\n                                      <h2 class=\"h2\">The tools we use<\/h2>\n                                                          <div class=\" row align-items-center\">\n                      <div class=\"col-lg-2 \"><\/div>\n                      <div class=\"col-lg-8 \">\n                        <div class=\" row align-items-center justify-content-center\">\n                                                      <div class=\"col-lg-2 col-6\">\n                              <div class=\"flex-column-56\" >\n                                <div class=\"image-container\" style=\"text-align:center;\">\n                                  <img decoding=\"async\" style=\"width: 100%;\" src=\"https:\/\/logient.com\/app\/uploads\/2024\/10\/images-4-removebg-preview.png\"  alt=\"\">\n                                <\/div>\n                              <\/div>\n                            <\/div>\n                                                      <div class=\"col-lg-2 col-6\">\n                              <div class=\"flex-column-56\" >\n                                <div class=\"image-container\" style=\"text-align:center;\">\n                                  <img decoding=\"async\" style=\"width: 100%;\" src=\"https:\/\/logient.com\/app\/uploads\/2024\/10\/snyk.png\"  alt=\"\">\n                                <\/div>\n                              <\/div>\n                            <\/div>\n                                                      <div class=\"col-lg-2 col-6\">\n                              <div class=\"flex-column-56\" >\n                                <div class=\"image-container\" style=\"text-align:center;\">\n                                  <img decoding=\"async\" style=\"width: 100%;\" src=\"https:\/\/logient.com\/app\/uploads\/2024\/10\/0-kgieclpu9w6clfas.png\"  alt=\"\">\n                                <\/div>\n                              <\/div>\n                            <\/div>\n                                                      <div class=\"col-lg-2 col-6\">\n                              <div class=\"flex-column-56\" >\n                                <div class=\"image-container\" style=\"text-align:center;\">\n                                  <img decoding=\"async\" style=\"width: 100%;\" src=\"https:\/\/logient.com\/app\/uploads\/2024\/10\/burp-suite-proxies-e6501bcb84.png\"  alt=\"\">\n                                <\/div>\n                              <\/div>\n                            <\/div>\n                                                  <\/div>\n                      <\/div>\n                      <div class=\"col-lg-2 \"><\/div>\n                    <\/div>\n                                  <\/div>\n            <\/div>\n        <\/div>\n  <\/div>\n\n<\/section>\n\n<section class=\"section  section-tabs auto center-txt-block  \"\n    >\n<div class=\"container-pd\">\n    <div class=\"tabs row align-items-center\">\n        <div class=\"col-lg-2 \"><\/div>\n        <div class=\"col-lg-8 \">\n            <div class=\"flex-column-56\" >\n                                    <h2 class=\"h2\">Securing Your Digital Frontiers: A 5-Step Approach<\/h2>\n                                            <\/div>\n        <\/div>\n        <div class=\"col-lg-2 \"><\/div>\n    <\/div>\n<\/div>\n\n<\/section>\n\n<section class=\"section  section-steps  defaultText \"\n    >\n    <div class=\"container-steps\">\n        <div class=\"step-fixed\">\n            <div class=\"container-pd\">\n                        <div class=\"step-header desktop-only\" style=\"display: none;\">\n              <span class=\"current-step\">01<\/span> \/ <span class=\"all-step-count\">04<\/span>\n          <\/div>\n          <div class=\"steps-list\">\n              <div class=\"steps flex-column-64\">\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">01<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">Plan<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">Define the scope, rules, and objectives of the assessment to ensure a clear and effective strategy tailored to organizational needs and goals.<br \/>\r\n<br \/>\r\n\u2022  Scope and Objectives <br \/>\r\n\u2022  Rules of Engagement<br \/>\r\n\u2022  Project Timeline and Milestones<br \/>\r\n\u2022  Risk Assessment Plan<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">02<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">Discover<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">Conduct thorough scans and reconnaissance to identify potential vulnerabilities, weaknesses, and entry points within the system or network.<br \/>\r\n<br \/>\r\n\u2022  Initial Assessment <br \/>\r\n\u2022  Digital Assets Inventory List<br \/>\r\n\u2022  Application Mapping<br \/>\r\n\u2022  Initial Findings Summary<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">03<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">Attack<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">Attempt to exploit identified vulnerabilities to verify their existence and assess their potential impact, simulating real-world attack scenarios.<br \/>\r\n<br \/>\r\n\u2022  Exploit Vulnerabilities<br \/>\r\n\u2022  Attack Vector Analysis<br \/>\r\n\u2022  Security Weakness Log<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">04<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">Report<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">Compile comprehensive reports detailing findings, confirmed vulnerabilities, and their implications, providing actionable recommendations.<br \/>\r\n<br \/>\r\n\u2022  Executive Summary<br \/>\r\n\u2022  Comprehensive Final Report<br \/>\r\n\u2022  Detailed Vulnerability Analysis<br \/>\r\n\u2022  Remediation recommendations<br \/>\r\n\u2022  Post-Engagement Review and Action Plan<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">05<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">Remediate<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">Align your next steps by  defining who does what, when, and how. This ensures all identified vulnerabilities are addressed efficiently.<br \/>\r\n<br \/>\r\n\u2022  Corrective Action Planning<br \/>\r\n\u2022  Task Assignment, Timeline and Implementation Strategy<br \/>\r\n\u2022  Retesting<br \/>\r\n\u2022  Continuous Monitoring<br \/>\r\n\u2022  Continuous Improvement Plan<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                <\/div>\n          <\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>","protected":false},"parent":0,"template":"","class_list":["post-12604","service","type-service","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Logient | Expertise | Cybersecurity<\/title>\n<meta name=\"description\" content=\"Ensure your cybersecurity with Logient\u2019s penetration testing and vulnerability scans.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/logient.com\/en\/service\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logient | Expertise | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Ensure your cybersecurity with Logient\u2019s penetration testing and vulnerability scans.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/logient.com\/en\/service\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Logient\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T13:26:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/logient.com\/app\/uploads\/2023\/03\/logient-image-de-partage-1200x627-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1202\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/logient.com\/en\/service\/cybersecurity\/\",\"url\":\"https:\/\/logient.com\/en\/service\/cybersecurity\/\",\"name\":\"Logient | Expertise | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/logient.com\/en\/#website\"},\"datePublished\":\"2024-10-23T14:55:56+00:00\",\"dateModified\":\"2025-06-20T13:26:18+00:00\",\"description\":\"Ensure your cybersecurity with Logient\u2019s penetration testing and vulnerability scans.\",\"breadcrumb\":{\"@id\":\"https:\/\/logient.com\/en\/service\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/logient.com\/en\/service\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/logient.com\/en\/service\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/logient.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/logient.com\/en\/#website\",\"url\":\"https:\/\/logient.com\/en\/\",\"name\":\"Logient\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/logient.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/logient.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/logient.com\/en\/#organization\",\"name\":\"Logient\",\"url\":\"https:\/\/logient.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/logient.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/logient.com\/app\/uploads\/2023\/09\/group-53-1-scaled-1.jpg\",\"contentUrl\":\"https:\/\/logient.com\/app\/uploads\/2023\/09\/group-53-1-scaled-1.jpg\",\"width\":2560,\"height\":1797,\"caption\":\"Logient\"},\"image\":{\"@id\":\"https:\/\/logient.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Logient | Expertise | Cybersecurity","description":"Ensure your cybersecurity with Logient\u2019s penetration testing and vulnerability scans.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/logient.com\/en\/service\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Logient | Expertise | Cybersecurity","og_description":"Ensure your cybersecurity with Logient\u2019s penetration testing and vulnerability scans.","og_url":"https:\/\/logient.com\/en\/service\/cybersecurity\/","og_site_name":"Logient","article_modified_time":"2025-06-20T13:26:18+00:00","og_image":[{"width":1202,"height":629,"url":"https:\/\/logient.com\/app\/uploads\/2023\/03\/logient-image-de-partage-1200x627-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/logient.com\/en\/service\/cybersecurity\/","url":"https:\/\/logient.com\/en\/service\/cybersecurity\/","name":"Logient | Expertise | Cybersecurity","isPartOf":{"@id":"https:\/\/logient.com\/en\/#website"},"datePublished":"2024-10-23T14:55:56+00:00","dateModified":"2025-06-20T13:26:18+00:00","description":"Ensure your cybersecurity with Logient\u2019s penetration testing and vulnerability scans.","breadcrumb":{"@id":"https:\/\/logient.com\/en\/service\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/logient.com\/en\/service\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/logient.com\/en\/service\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/logient.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/logient.com\/en\/#website","url":"https:\/\/logient.com\/en\/","name":"Logient","description":"","publisher":{"@id":"https:\/\/logient.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/logient.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/logient.com\/en\/#organization","name":"Logient","url":"https:\/\/logient.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/logient.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/logient.com\/app\/uploads\/2023\/09\/group-53-1-scaled-1.jpg","contentUrl":"https:\/\/logient.com\/app\/uploads\/2023\/09\/group-53-1-scaled-1.jpg","width":2560,"height":1797,"caption":"Logient"},"image":{"@id":"https:\/\/logient.com\/en\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/logient.com\/en\/wp-json\/wp\/v2\/service\/12604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logient.com\/en\/wp-json\/wp\/v2\/service"}],"about":[{"href":"https:\/\/logient.com\/en\/wp-json\/wp\/v2\/types\/service"}],"wp:attachment":[{"href":"https:\/\/logient.com\/en\/wp-json\/wp\/v2\/media?parent=12604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}