{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifjn7timtocblhdopfi4ne24fe6csmizkpztkpnurccji74taol5i",
"uri": "at://did:plc:ctcqaqa3tlbhfwmfefti346h/app.bsky.feed.post/3mhbenhxcvwo2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiewyr6cpuloichygummxm23pcajqnflyeibp6vmymd4amjv2ommzi"
},
"mimeType": "image/jpeg",
"size": 97865
},
"path": "/pro/the-evolution-of-cyber-deception-does-it-deserve-a-place-in-your-security-strategy",
"publishedAt": "2026-03-17T15:27:52.000Z",
"site": "https://www.techradar.com",
"tags": [
"Pro"
],
"textContent": "The overall objectives for cyber deception have evolved. Understanding its value starts with understanding where it fits within your security stack.",
"title": "The evolution of cyber deception: Does it deserve a place in your security strategy?",
"updatedAt": "2026-03-17T15:27:52.000Z"
}