{"id":621,"date":"2018-02-09T16:40:40","date_gmt":"2018-02-09T16:40:40","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=621"},"modified":"2020-05-06T10:27:53","modified_gmt":"2020-05-06T17:27:53","slug":"how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/","title":{"rendered":"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?"},"content":{"rendered":"<div class=\"lia-message-body lia-component-body\">\n<div class=\"lia-message-body-content\">\n<p>Threat Intelligence is an often-used phrase in the security world today. But what does it mean and how can companies leverage Threat Intel to improve their network security?<br \/>\nListen to Sam Kumarsamy, Product Marketing at Infoblox and Douglas Hurd, Cisco Security Technical Alliances for a lively discussion on:<br \/>\n&#8211; What is Threat Intelligence?<br \/>\n&#8211; Threat Intelligence best practices<br \/>\n&#8211; How are Infoblox and Cisco partnering to deliver Threat Intelligence to enterprises?<br \/>\n&#8211; Customer benefits of Cisco\/Infoblox Threat Intel partnership<br \/>\n&#8211; Infoblox Threat Intel Evaluation offering<\/p>\n<p>Suggested reading:<\/p>\n<p><a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-solution-note-infoblox-threat-intelligence-data-exchange-for-activetrust.pdf\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Infoblox Threat Intelligence Data Exchange\u00a0(TIDE) Solution Note<\/a>.<\/p>\n<p><a href=\"\/community\/infoblox-cisco-integrations-will-make-you-a-networking-and-security-superhero\/\" target=\"_blank\" rel=\"noopener noreferrer\">Infoblox-Cisco integrations will make you a Networking and Security superhero<\/a><\/p>\n<p><iframe loading=\"lazy\" id=\"4EbZD8LgpiM\" class=\" bf_frame_init\" src=\"https:\/\/www.youtube.com\/embed\/4EbZD8LgpiM?enablejsapi=1&amp;origin=https:\/\/community.infoblox.com\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<\/div>\n<\/div>\n<div class=\"lia-message-footer lia-component-message-footer\">\n<div class=\"lia-message-tags\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Threat Intelligence is an often-used phrase in the security world today. But what does it mean and how can companies leverage Threat Intel to improve their network security? Listen to Sam Kumarsamy, Product Marketing at Infoblox and Douglas Hurd, Cisco Security Technical Alliances for a lively discussion on: &#8211; What is Threat Intelligence? &#8211; Threat [&hellip;]<\/p>\n","protected":false},"author":270,"featured_media":566,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[15,40],"class_list":{"0":"post-621","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-security","9":"tag-threat-intelligence","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?<\/title>\n<meta name=\"description\" content=\"Threat Intelligence is an often-used phrase in the security world today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?\" \/>\n<meta property=\"og:description\" content=\"Threat Intelligence is an often-used phrase in the security world today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-09T16:40:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Srinivas Penumaka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Srinivas Penumaka\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/\"},\"author\":{\"name\":\"Srinivas Penumaka\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4404b78793ca92db7dee7f4b841f5293\"},\"headline\":\"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?\",\"datePublished\":\"2018-02-09T16:40:40+00:00\",\"dateModified\":\"2020-05-06T17:27:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/\"},\"wordCount\":119,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"keywords\":[\"Security\",\"Threat Intelligence\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/\",\"name\":\"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"datePublished\":\"2018-02-09T16:40:40+00:00\",\"dateModified\":\"2020-05-06T17:27:53+00:00\",\"description\":\"Threat Intelligence is an often-used phrase in the security world today.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4404b78793ca92db7dee7f4b841f5293\",\"name\":\"Srinivas Penumaka\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"caption\":\"Srinivas Penumaka\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/srinivas-penumaka\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?","description":"Threat Intelligence is an often-used phrase in the security world today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?","og_description":"Threat Intelligence is an often-used phrase in the security world today.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/","og_site_name":"Infoblox Blog","article_published_time":"2018-02-09T16:40:40+00:00","article_modified_time":"2020-05-06T17:27:53+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","type":"image\/jpeg"}],"author":"Srinivas Penumaka","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Srinivas Penumaka","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/"},"author":{"name":"Srinivas Penumaka","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4404b78793ca92db7dee7f4b841f5293"},"headline":"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?","datePublished":"2018-02-09T16:40:40+00:00","dateModified":"2020-05-06T17:27:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/"},"wordCount":119,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","keywords":["Security","Threat Intelligence"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/","url":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/","name":"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","datePublished":"2018-02-09T16:40:40+00:00","dateModified":"2020-05-06T17:27:53+00:00","description":"Threat Intelligence is an often-used phrase in the security world today.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-are-infoblox-and-cisco-working-together-in-establishing-threat-intelligence-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"How are Infoblox and Cisco Working together in Establishing Threat Intelligence Best Practices?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4404b78793ca92db7dee7f4b841f5293","name":"Srinivas Penumaka","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","caption":"Srinivas Penumaka"},"url":"https:\/\/www.infoblox.com\/blog\/author\/srinivas-penumaka\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/270"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=621"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/621\/revisions"}],"predecessor-version":[{"id":1200,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/621\/revisions\/1200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/566"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}