{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreidlxtfeqixuevtjia7sp2uhzuxx3mjfs762hn7nwnkt2fnmwu676m",
"uri": "at://did:plc:klkgxrhct7epqznuvf6tawoy/app.bsky.feed.post/3mlsr2zfirx32"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreihxryk3x3ktf32iakyndxcaitk4olelf5fwocj4rsfdbckyb2il64"
},
"mimeType": "image/jpeg",
"size": 40831
},
"path": "/commentary/2026/05/the-next-phase-of-zero-trust-from-recognizing-known-threats-to-stopping-threats/",
"publishedAt": "2026-05-13T20:57:57.000Z",
"site": "https://federalnewsnetwork.com",
"tags": [
"Artificial Intelligence",
"Commentary",
"Cybersecurity",
"IT Modernization",
"Management",
"Technology",
"Abnormal AI",
"Federal Information Security Modernization Act",
"federal zero trust strategy",
"Microsoft",
"multi-factor authentication",
"Office of Management and Budget",
"phishing",
"Yejin Jang",
"zero trust"
],
"textContent": "In an environment defined by continuous change, resilience depends not on knowing the threat, but on being able to stop it.",
"title": "The next phase of zero trust: From recognizing known threats to stopping threats"
}