{"id":51091,"date":"2023-10-17T17:08:53","date_gmt":"2023-10-17T17:08:53","guid":{"rendered":"https:\/\/www.cloudthat.com\/resources\/?post_type=blog&#038;p=51091"},"modified":"2024-06-25T10:20:30","modified_gmt":"2024-06-25T10:20:30","slug":"reasons-for-building-an-airtight-cybersecurity-posture","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/reasons-for-building-an-airtight-cybersecurity-posture","title":{"rendered":"Reasons for Building an Airtight Cybersecurity Posture"},"content":{"rendered":"","protected":false},"author":1075,"featured_media":50732,"parent":0,"comment_status":"open","ping_status":"closed","template":"","blog_category":[4459],"user_email":"saloni@cloudthat.com","published_by":"1075","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/51091"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/1075"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=51091"}],"version-history":[{"count":3,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/51091\/revisions"}],"predecessor-version":[{"id":51094,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/51091\/revisions\/51094"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/50732"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=51091"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=51091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}