{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigk3oy3ajolnayowub5oc3hto7odwqsh6yow2wblb47zbltky6hbe",
"uri": "at://did:plc:sfnebosvwzcw36qxtq46btk4/app.bsky.feed.post/3mfms32dnhkf2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreigrrj3ykgti7bqjjawpt43sczax4b7gvhrw4khqlrur4uxy2aabqq"
},
"mimeType": "image/jpeg",
"size": 59128
},
"path": "/security/how-to-use-cyber-deception-in-your-security-strategy",
"publishedAt": "2026-02-24T15:18:23.000Z",
"site": "https://www.itpro.com",
"tags": [
"Security"
],
"textContent": "Cyber deception allows firms to play adversaries at their own game – but how is it achieved?",
"title": "How to use cyber-deception in your security strategy",
"updatedAt": "2026-02-24T15:18:24.000Z"
}