{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifqklprbjfindqepddsg2cnh4zt5b2u672bjglpdsdatqdngonaue",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mkkvuzmllgk2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreidgo6wensznxxqfbbf75pawz2wavwxmi3quhk4m7r23ju2budcebi"
    },
    "mimeType": "image/jpeg",
    "size": 93342
  },
  "path": "/2026/04/why-secure-data-movement-is-zero-trust.html",
  "publishedAt": "2026-04-28T11:58:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done.\nThat assumption is wrong. It is also a major reason Zero Trust programs stall.\nNew research my team just published puts numbers on it. The Cyber360: Defending the Digital Battlespace report, based on a survey of 500 security",
  "title": "Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About"
}