{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifjn7timtocblhdopfi4ne24fe6csmizkpztkpnurccji74taol5i",
    "uri": "at://did:plc:ctcqaqa3tlbhfwmfefti346h/app.bsky.feed.post/3mhbenhxcvwo2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiewyr6cpuloichygummxm23pcajqnflyeibp6vmymd4amjv2ommzi"
    },
    "mimeType": "image/jpeg",
    "size": 97865
  },
  "path": "/pro/the-evolution-of-cyber-deception-does-it-deserve-a-place-in-your-security-strategy",
  "publishedAt": "2026-03-17T15:27:52.000Z",
  "site": "https://www.techradar.com",
  "tags": [
    "Pro"
  ],
  "textContent": "The overall objectives for cyber deception have evolved. Understanding its value starts with understanding where it fits within your security stack.",
  "title": "The evolution of cyber deception: Does it deserve a place in your security strategy?",
  "updatedAt": "2026-03-17T15:27:52.000Z"
}