{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiclserkbsoyqetja4lhatgwwomq3avlwnmh6rr377zlk4d632kbeq",
"uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3miycmuggqir2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiape3f5daj2tze5ym6q3omtyssrkjwsiqow422rk7hfnkxkox54qe"
},
"mimeType": "image/png",
"size": 1038840
},
"path": "/cybersecurity-blog/phishing-detection-steps-for-cisos/",
"publishedAt": "2026-04-08T11:18:59.000Z",
"site": "https://any.run",
"tags": [
"article"
],
"textContent": "\nLearn 3 practical steps CISOs can use to strengthen phishing detection across monitoring, triage, and response to reduce risk and improve SOC performance.",
"title": "Building Phishing Detection That Works: 3 Steps for CISOs"
}