{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreic5jvsjv2hrslojkzosober3c6hb7ou26zmf4hu33tg5pb5qezbla",
"uri": "at://did:plc:sfnebosvwzcw36qxtq46btk4/app.bsky.feed.post/3mhg6igbed2v2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreigvahkiqnga2o6egjrs2khvn2vb5oc7bcm2n75quceesmqqncjota"
},
"mimeType": "image/jpeg",
"size": 167773
},
"path": "/security/is-your-zero-trust-model-prepared-for-modern-threats",
"publishedAt": "2026-03-19T12:35:36.000Z",
"site": "https://www.itpro.com",
"tags": [
"Security"
],
"textContent": "Meeting the demands of the latest zero trust guidelines involves ditching legacy apps and positioning for non-human identities",
"title": "Is your zero trust model prepared for modern threats?",
"updatedAt": "2026-03-19T12:35:36.000Z"
}