{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreidlxtfeqixuevtjia7sp2uhzuxx3mjfs762hn7nwnkt2fnmwu676m",
    "uri": "at://did:plc:klkgxrhct7epqznuvf6tawoy/app.bsky.feed.post/3mlsr2zfirx32"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreihxryk3x3ktf32iakyndxcaitk4olelf5fwocj4rsfdbckyb2il64"
    },
    "mimeType": "image/jpeg",
    "size": 40831
  },
  "path": "/commentary/2026/05/the-next-phase-of-zero-trust-from-recognizing-known-threats-to-stopping-threats/",
  "publishedAt": "2026-05-13T20:57:57.000Z",
  "site": "https://federalnewsnetwork.com",
  "tags": [
    "Artificial Intelligence",
    "Commentary",
    "Cybersecurity",
    "IT Modernization",
    "Management",
    "Technology",
    "Abnormal AI",
    "Federal Information Security Modernization Act",
    "federal zero trust strategy",
    "Microsoft",
    "multi-factor authentication",
    "Office of Management and Budget",
    "phishing",
    "Yejin Jang",
    "zero trust"
  ],
  "textContent": "In an environment defined by continuous change, resilience depends not on knowing the threat, but on being able to stop it.",
  "title": "The next phase of zero trust: From recognizing known threats to stopping threats"
}