{"id":35829,"date":"2023-03-23T15:45:19","date_gmt":"2023-03-23T15:45:19","guid":{"rendered":"https:\/\/www.cloudthat.com\/resources\/?post_type=blog&#038;p=35829"},"modified":"2024-06-25T10:45:04","modified_gmt":"2024-06-25T10:45:04","slug":"adoption-of-zero-trust-networking-with-twingate-part-2","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/adoption-of-zero-trust-networking-with-twingate-part-2","title":{"rendered":"Adoption of Zero Trust Networking with Twingate &#8211; Part 2"},"content":{"rendered":"","protected":false},"author":246,"featured_media":35988,"parent":0,"comment_status":"open","ping_status":"closed","template":"","blog_category":[3606,3608,3607,3718],"user_email":"sridhari@cloudthat.com","published_by":"324","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/35829"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/246"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=35829"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/35829\/revisions"}],"predecessor-version":[{"id":45676,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/35829\/revisions\/45676"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/35988"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=35829"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=35829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}