{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifqklprbjfindqepddsg2cnh4zt5b2u672bjglpdsdatqdngonaue",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mkkvuzmllgk2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreidgo6wensznxxqfbbf75pawz2wavwxmi3quhk4m7r23ju2budcebi"
},
"mimeType": "image/jpeg",
"size": 93342
},
"path": "/2026/04/why-secure-data-movement-is-zero-trust.html",
"publishedAt": "2026-04-28T11:58:00.000Z",
"site": "https://thehackernews.com",
"textContent": "Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done.\nThat assumption is wrong. It is also a major reason Zero Trust programs stall.\nNew research my team just published puts numbers on it. The Cyber360: Defending the Digital Battlespace report, based on a survey of 500 security",
"title": "Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About"
}