{"id":704,"date":"2025-02-26T00:12:52","date_gmt":"2025-02-25T22:12:52","guid":{"rendered":"https:\/\/africacybersecure.org\/?p=704"},"modified":"2025-07-18T00:18:25","modified_gmt":"2025-07-17T22:18:25","slug":"introducing-ulk-students-to-accs-portfolio-of-products-and-services","status":"publish","type":"post","link":"https:\/\/africacybersecure.org\/?p=704","title":{"rendered":"Introducing ULK students to ACC&#8217;s portfolio of products and services"},"content":{"rendered":"<p style=\"text-align: justify;\">On 24th February 2025, Africa Cybersecurity Consortium (ACC) had the opportunity to introduce its portfolio of products and services to the students from Kigali Independent University (ULK).\u00a0 Africa Cybersecurity Consortium (ACC)\u00a0 also presented internship and volunteer opportunities to students from Computer Science Department majoring in Networking, Software Engineering, and Data Science. ACC demonstrated the functionalities of one of its cybersecurity product portfolio, Automated Cyber Resilience (ACR) solution, that redefines cybersecurity resilience for individual and organizations by monitoring, analyzing, and securing digital assets in real-time across multiple devices.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-706 size-full\" src=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-4-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1920\" srcset=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-4-scaled.jpg 2560w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-4-300x225.jpg 300w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-4-1024x768.jpg 1024w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-4-768x576.jpg 768w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-4-1536x1152.jpg 1536w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-4-2048x1536.jpg 2048w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-4-400x300.jpg 400w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<p>TUYISHIMIRE Jean Bonfils and MURAMIRA Hilary shared with the participants, the background and vision of ACC and its service portfolio.<\/p>\n<figure id=\"attachment_707\" aria-describedby=\"caption-attachment-707\" style=\"width: 2560px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-707 size-full\" src=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-2-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1920\" srcset=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-2-scaled.jpg 2560w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-2-300x225.jpg 300w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-2-1024x768.jpg 1024w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-2-768x576.jpg 768w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-2-1536x1152.jpg 1536w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-2-2048x1536.jpg 2048w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-2-400x300.jpg 400w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><figcaption id=\"caption-attachment-707\" class=\"wp-caption-text\">NEZERWA Pacifique, a founder of Nelevat and a partner of ACC, shared the relevance for the use of Automated Cyber Resilience (ACR) solutions to build cybersecurity resilience.<\/figcaption><\/figure>\n<p style=\"text-align: justify;\">ACC has partnered with NELEVAT to drive innovation, skill development, and digital security across Rwanda and throughout the entire Africa. At ACC, NEZERWA Pacifique coordinates the Professional Empowerment Programme to ensure that we jointly bridge the digital skills gap especially in cybersecurity and the related fields.<\/p>\n<figure id=\"attachment_708\" aria-describedby=\"caption-attachment-708\" style=\"width: 2560px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-708 size-full\" src=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-1-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1920\" srcset=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-1-scaled.jpg 2560w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-1-300x225.jpg 300w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-1-1024x768.jpg 1024w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-1-768x576.jpg 768w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-1-1536x1152.jpg 1536w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-1-2048x1536.jpg 2048w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-1-400x300.jpg 400w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><figcaption id=\"caption-attachment-708\" class=\"wp-caption-text\">ACC was honored with the presence of RUTARINDWA Jean Pierre, Head of Computer Science Department at ULK, Kigali Campus.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>On 24th February 2025, Africa Cybersecurity Consortium (ACC) had the opportunity to introduce its portfolio of products and services to the students from Kigali Independent University (ULK).\u00a0 Africa Cybersecurity Consortium (ACC)\u00a0 also presented internship and volunteer opportunities to students from Computer Science Department majoring in Networking, Software Engineering, and Data Science. ACC demonstrated the functionalities [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":705,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing ULK students to ACC&#039;s portfolio of products and services - Africa Cybersecurity Consortium<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/africacybersecure.org\/?p=704\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing ULK students to ACC&#039;s portfolio of products and services - Africa Cybersecurity Consortium\" \/>\n<meta property=\"og:description\" content=\"On 24th February 2025, Africa Cybersecurity Consortium (ACC) had the opportunity to introduce its portfolio of products and services to the students from Kigali Independent University (ULK).\u00a0 Africa Cybersecurity Consortium (ACC)\u00a0 also presented internship and volunteer opportunities to students from Computer Science Department majoring in Networking, Software Engineering, and Data Science. ACC demonstrated the functionalities [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/africacybersecure.org\/?p=704\" \/>\n<meta property=\"og:site_name\" content=\"Africa Cybersecurity Consortium\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-25T22:12:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-17T22:18:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Africa Cybersecurity Consortium\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Africa Cybersecurity Consortium\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/africacybersecure.org\/?p=704#article\",\"isPartOf\":{\"@id\":\"https:\/\/africacybersecure.org\/?p=704\"},\"author\":{\"name\":\"Africa Cybersecurity Consortium\",\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/person\/e0a955a564907b59b2e5b099fadd0312\"},\"headline\":\"Introducing ULK students to ACC&#8217;s portfolio of products and services\",\"datePublished\":\"2025-02-25T22:12:52+00:00\",\"dateModified\":\"2025-07-17T22:18:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/africacybersecure.org\/?p=704\"},\"wordCount\":222,\"publisher\":{\"@id\":\"https:\/\/africacybersecure.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/africacybersecure.org\/?p=704#primaryimage\"},\"thumbnailUrl\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/africacybersecure.org\/?p=704\",\"url\":\"https:\/\/africacybersecure.org\/?p=704\",\"name\":\"Introducing ULK students to ACC's portfolio of products and services - Africa Cybersecurity Consortium\",\"isPartOf\":{\"@id\":\"https:\/\/africacybersecure.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/africacybersecure.org\/?p=704#primaryimage\"},\"image\":{\"@id\":\"https:\/\/africacybersecure.org\/?p=704#primaryimage\"},\"thumbnailUrl\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg\",\"datePublished\":\"2025-02-25T22:12:52+00:00\",\"dateModified\":\"2025-07-17T22:18:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/africacybersecure.org\/?p=704#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/africacybersecure.org\/?p=704\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/africacybersecure.org\/?p=704#primaryimage\",\"url\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg\",\"contentUrl\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg\",\"width\":2560,\"height\":1920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/africacybersecure.org\/?p=704#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/africacybersecure.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introducing ULK students to ACC&#8217;s portfolio of products and services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/africacybersecure.org\/#website\",\"url\":\"https:\/\/africacybersecure.org\/\",\"name\":\"Africa Cybersecurity Consortium\",\"description\":\"It is about secure cyber\",\"publisher\":{\"@id\":\"https:\/\/africacybersecure.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/africacybersecure.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/africacybersecure.org\/#organization\",\"name\":\"Africa Cybersecurity Consortium\",\"url\":\"https:\/\/africacybersecure.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png\",\"contentUrl\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png\",\"width\":250,\"height\":62,\"caption\":\"Africa Cybersecurity Consortium\"},\"image\":{\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/person\/e0a955a564907b59b2e5b099fadd0312\",\"name\":\"Africa Cybersecurity Consortium\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f396074e6a4089d3f0df837bee7861929950039c48f6f24b9e972facc5434e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f396074e6a4089d3f0df837bee7861929950039c48f6f24b9e972facc5434e4?s=96&d=mm&r=g\",\"caption\":\"Africa Cybersecurity Consortium\"},\"sameAs\":[\"http:\/\/africacybersecure.org\"],\"url\":\"https:\/\/africacybersecure.org\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing ULK students to ACC's portfolio of products and services - Africa Cybersecurity Consortium","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/africacybersecure.org\/?p=704","og_locale":"en_US","og_type":"article","og_title":"Introducing ULK students to ACC's portfolio of products and services - Africa Cybersecurity Consortium","og_description":"On 24th February 2025, Africa Cybersecurity Consortium (ACC) had the opportunity to introduce its portfolio of products and services to the students from Kigali Independent University (ULK).\u00a0 Africa Cybersecurity Consortium (ACC)\u00a0 also presented internship and volunteer opportunities to students from Computer Science Department majoring in Networking, Software Engineering, and Data Science. ACC demonstrated the functionalities [&hellip;]","og_url":"https:\/\/africacybersecure.org\/?p=704","og_site_name":"Africa Cybersecurity Consortium","article_published_time":"2025-02-25T22:12:52+00:00","article_modified_time":"2025-07-17T22:18:25+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg","type":"image\/jpeg"}],"author":"Africa Cybersecurity Consortium","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Africa Cybersecurity Consortium","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/africacybersecure.org\/?p=704#article","isPartOf":{"@id":"https:\/\/africacybersecure.org\/?p=704"},"author":{"name":"Africa Cybersecurity Consortium","@id":"https:\/\/africacybersecure.org\/#\/schema\/person\/e0a955a564907b59b2e5b099fadd0312"},"headline":"Introducing ULK students to ACC&#8217;s portfolio of products and services","datePublished":"2025-02-25T22:12:52+00:00","dateModified":"2025-07-17T22:18:25+00:00","mainEntityOfPage":{"@id":"https:\/\/africacybersecure.org\/?p=704"},"wordCount":222,"publisher":{"@id":"https:\/\/africacybersecure.org\/#organization"},"image":{"@id":"https:\/\/africacybersecure.org\/?p=704#primaryimage"},"thumbnailUrl":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/africacybersecure.org\/?p=704","url":"https:\/\/africacybersecure.org\/?p=704","name":"Introducing ULK students to ACC's portfolio of products and services - Africa Cybersecurity Consortium","isPartOf":{"@id":"https:\/\/africacybersecure.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/africacybersecure.org\/?p=704#primaryimage"},"image":{"@id":"https:\/\/africacybersecure.org\/?p=704#primaryimage"},"thumbnailUrl":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg","datePublished":"2025-02-25T22:12:52+00:00","dateModified":"2025-07-17T22:18:25+00:00","breadcrumb":{"@id":"https:\/\/africacybersecure.org\/?p=704#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/africacybersecure.org\/?p=704"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/africacybersecure.org\/?p=704#primaryimage","url":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg","contentUrl":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-scaled.jpg","width":2560,"height":1920},{"@type":"BreadcrumbList","@id":"https:\/\/africacybersecure.org\/?p=704#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/africacybersecure.org\/"},{"@type":"ListItem","position":2,"name":"Introducing ULK students to ACC&#8217;s portfolio of products and services"}]},{"@type":"WebSite","@id":"https:\/\/africacybersecure.org\/#website","url":"https:\/\/africacybersecure.org\/","name":"Africa Cybersecurity Consortium","description":"It is about secure cyber","publisher":{"@id":"https:\/\/africacybersecure.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/africacybersecure.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/africacybersecure.org\/#organization","name":"Africa Cybersecurity Consortium","url":"https:\/\/africacybersecure.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/","url":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png","contentUrl":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png","width":250,"height":62,"caption":"Africa Cybersecurity Consortium"},"image":{"@id":"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/africacybersecure.org\/#\/schema\/person\/e0a955a564907b59b2e5b099fadd0312","name":"Africa Cybersecurity Consortium","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/africacybersecure.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f396074e6a4089d3f0df837bee7861929950039c48f6f24b9e972facc5434e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f396074e6a4089d3f0df837bee7861929950039c48f6f24b9e972facc5434e4?s=96&d=mm&r=g","caption":"Africa Cybersecurity Consortium"},"sameAs":["http:\/\/africacybersecure.org"],"url":"https:\/\/africacybersecure.org\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/posts\/704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=704"}],"version-history":[{"count":2,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/posts\/704\/revisions"}],"predecessor-version":[{"id":710,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/posts\/704\/revisions\/710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/media\/705"}],"wp:attachment":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}