{"id":8415,"date":"2021-10-14T16:04:59","date_gmt":"2021-10-14T20:04:59","guid":{"rendered":"https:\/\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg"},"modified":"2021-10-14T16:51:26","modified_gmt":"2021-10-14T20:51:26","slug":"cyber-security-2","status":"inherit","type":"attachment","link":"https:\/\/sites.udmercy.edu\/campusconnection\/cyber-security-2\/","title":{"rendered":"Cyber security conference 2"},"author":224,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false},"smush":{"stats":{"percent":46.16879878382194846153652179054915904998779296875,"bytes":614684,"size_before":1331384,"size_after":716700,"time":0.87999999999999989341858963598497211933135986328125,"api_version":"1.0","lossy":1,"keep_exif":0},"sizes":{"thumbnail":{"percent":83.400000000000005684341886080801486968994140625,"bytes":34771,"size_before":41692,"size_after":6921,"time":0.01000000000000000020816681711721685132943093776702880859375},"fluida-lpbox-1":{"percent":64.1299999999999954525264911353588104248046875,"bytes":39586,"size_before":61730,"size_after":22144,"time":0.040000000000000000832667268468867405317723751068115234375},"fluida-lpbox-2":{"percent":54.92999999999999971578290569595992565155029296875,"bytes":43787,"size_before":79710,"size_after":35923,"time":0.0299999999999999988897769753748434595763683319091796875},"fluida-header":{"percent":43.11999999999999744204615126363933086395263671875,"bytes":51266,"size_before":118878,"size_after":67612,"time":0.05000000000000000277555756156289135105907917022705078125},"medium_large":{"percent":45.47999999999999687361196265555918216705322265625,"bytes":51228,"size_before":112643,"size_after":61415,"time":0.059999999999999997779553950749686919152736663818359375},"fluida-featured-half":{"percent":43.78999999999999914734871708787977695465087890625,"bytes":52640,"size_before":120211,"size_after":67571,"time":0.05000000000000000277555756156289135105907917022705078125},"medium":{"percent":71.900000000000005684341886080801486968994140625,"bytes":37184,"size_before":51718,"size_after":14534,"time":0.1000000000000000055511151231257827021181583404541015625},"full":{"percent":38.89999999999999857891452847979962825775146484375,"bytes":83349,"size_before":214240,"size_after":130891,"time":0.0899999999999999966693309261245303787291049957275390625},"fluida-featured":{"percent":38.38000000000000255795384873636066913604736328125,"bytes":60251,"size_before":156969,"size_after":96718,"time":0.070000000000000006661338147750939242541790008544921875},"fluida-featured-third":{"percent":48.97999999999999687361196265555918216705322265625,"bytes":46207,"size_before":94342,"size_after":48135,"time":0.179999999999999993338661852249060757458209991455078125},"large":{"percent":38.97999999999999687361196265555918216705322265625,"bytes":61203,"size_before":156992,"size_after":95789,"time":0.1000000000000000055511151231257827021181583404541015625},"post-thumbnail":{"percent":43.52000000000000312638803734444081783294677734375,"bytes":53212,"size_before":122259,"size_after":69047,"time":0.1000000000000000055511151231257827021181583404541015625}}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/abwnTV-2bJ","description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?ssl=1'><img width=\"300\" height=\"200\" src=\"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?fit=300%2C200&amp;ssl=1\" class=\"attachment-medium size-medium\" alt=\"Paul Spadafora (left) and Mark Zachos on stage at the conference\" decoding=\"async\" srcset=\"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=825%2C550&amp;ssl=1 825w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n"},"caption":{"rendered":"<p>Paul Spadafora and Mark Zachos of the Vehicle Cybersecurity Institute present information on the University\u2019s efforts to combat cybersecurity threats through new, comprehensive academic programming and corporate partnerships.<\/p>\n"},"alt_text":"Paul Spadafora (left) and Mark Zachos on stage at the conference","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":1200,"height":800,"file":"2021\/10\/Cyber-security-2.jpg","sizes":{"medium":{"file":"Cyber-security-2-300x200.jpg","width":300,"height":200,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?fit=300%2C200&ssl=1"},"large":{"file":"Cyber-security-2-1024x683.jpg","width":1024,"height":683,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?fit=993%2C662&ssl=1"},"thumbnail":{"file":"Cyber-security-2-150x150.jpg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=150%2C150&ssl=1"},"medium_large":{"file":"Cyber-security-2-768x512.jpg","width":768,"height":512,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?fit=768%2C512&ssl=1"},"post-thumbnail":{"file":"Cyber-security-2-825x550.jpg","width":825,"height":550,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?fit=825%2C550&ssl=1"},"fluida-featured":{"file":"Cyber-security-2-1200x550.jpg","width":1200,"height":550,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=1200%2C550&ssl=1"},"fluida-featured-lp":{"file":"Cyber-security-2-1200x550.jpg","width":1200,"height":550,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=1200%2C550&ssl=1"},"fluida-featured-half":{"file":"Cyber-security-2-800x550.jpg","width":800,"height":550,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=800%2C550&ssl=1"},"fluida-featured-third":{"file":"Cyber-security-2-512x550.jpg","width":512,"height":550,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=512%2C550&ssl=1"},"fluida-header":{"file":"Cyber-security-2-1200x375.jpg","width":1200,"height":375,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=1200%2C375&ssl=1"},"fluida-lpbox-1":{"file":"Cyber-security-2-426x250.jpg","width":426,"height":250,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=426%2C250&ssl=1"},"fluida-lpbox-2":{"file":"Cyber-security-2-480x400.jpg","width":480,"height":400,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?resize=480%2C400&ssl=1"},"full":{"file":"Cyber-security-2.jpg?fit=1200%2C800&ssl=1","width":1200,"height":800,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg?fit=1200%2C800&ssl=1"}},"image_meta":{"aperture":"2.8","credit":"JORDAN EWERT","camera":"ILCE-7RM2","caption":"","created_timestamp":"1634123590","copyright":"Jordan Ewert Photography","focal_length":"58","iso":"1600","shutter_speed":"0.00625","title":"","orientation":"0","keywords":[]}},"post":null,"source_url":"https:\/\/sites.udmercy.edu\/campusconnection\/wp-content\/uploads\/sites\/106\/2021\/10\/Cyber-security-2.jpg","_links":{"self":[{"href":"https:\/\/sites.udmercy.edu\/campusconnection\/wp-json\/wp\/v2\/media\/8415"}],"collection":[{"href":"https:\/\/sites.udmercy.edu\/campusconnection\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/sites.udmercy.edu\/campusconnection\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/campusconnection\/wp-json\/wp\/v2\/users\/224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/campusconnection\/wp-json\/wp\/v2\/comments?post=8415"}]}}