{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigk3oy3ajolnayowub5oc3hto7odwqsh6yow2wblb47zbltky6hbe",
    "uri": "at://did:plc:sfnebosvwzcw36qxtq46btk4/app.bsky.feed.post/3mfms32dnhkf2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreigrrj3ykgti7bqjjawpt43sczax4b7gvhrw4khqlrur4uxy2aabqq"
    },
    "mimeType": "image/jpeg",
    "size": 59128
  },
  "path": "/security/how-to-use-cyber-deception-in-your-security-strategy",
  "publishedAt": "2026-02-24T15:18:23.000Z",
  "site": "https://www.itpro.com",
  "tags": [
    "Security"
  ],
  "textContent": "Cyber deception allows firms to play adversaries at their own game – but how is it achieved?",
  "title": "How to use cyber-deception in your security strategy",
  "updatedAt": "2026-02-24T15:18:24.000Z"
}