{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreic5jvsjv2hrslojkzosober3c6hb7ou26zmf4hu33tg5pb5qezbla",
    "uri": "at://did:plc:sfnebosvwzcw36qxtq46btk4/app.bsky.feed.post/3mhg6igbed2v2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreigvahkiqnga2o6egjrs2khvn2vb5oc7bcm2n75quceesmqqncjota"
    },
    "mimeType": "image/jpeg",
    "size": 167773
  },
  "path": "/security/is-your-zero-trust-model-prepared-for-modern-threats",
  "publishedAt": "2026-03-19T12:35:36.000Z",
  "site": "https://www.itpro.com",
  "tags": [
    "Security"
  ],
  "textContent": "Meeting the demands of the latest zero trust guidelines involves ditching legacy apps and positioning for non-human identities",
  "title": "Is your zero trust model prepared for modern threats?",
  "updatedAt": "2026-03-19T12:35:36.000Z"
}