{"id":1,"name":"sairaj.kyama","url":"https:\/\/icssecurity.in\/blog","description":"","link":"https:\/\/icssecurity.in\/blog\/author\/sairaj-kyama\/","slug":"sairaj-kyama","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/1ca8d178f88fc404008d8a140dacc1646c90b7c4b2959a30cf9acb61ac8fdd3c?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/1ca8d178f88fc404008d8a140dacc1646c90b7c4b2959a30cf9acb61ac8fdd3c?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/1ca8d178f88fc404008d8a140dacc1646c90b7c4b2959a30cf9acb61ac8fdd3c?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/icssecurity.in\/blog\/wp-json\/wp\/v2\/users\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icssecurity.in\/blog\/wp-json\/wp\/v2\/users"}]}}