{"id":74651,"date":"2026-03-18T10:18:53","date_gmt":"2026-03-18T10:18:53","guid":{"rendered":"https:\/\/www.cloudthat.com\/resources\/?post_type=blog&#038;p=74651"},"modified":"2026-03-18T10:18:53","modified_gmt":"2026-03-18T10:18:53","slug":"cloud-ids-in-gcp-a-complete-guide-to-intrusion-detection","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/cloud-ids-in-gcp-a-complete-guide-to-intrusion-detection","title":{"rendered":"Cloud IDS in GCP: A Complete Guide to Intrusion Detection"},"content":{"rendered":"","protected":false},"author":297,"featured_media":75188,"parent":0,"comment_status":"open","ping_status":"closed","template":"","blog_category":[3718],"user_email":"mahekt@cloudthat.com","published_by":"10128","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/74651"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=74651"}],"version-history":[{"count":3,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/74651\/revisions"}],"predecessor-version":[{"id":75190,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/74651\/revisions\/75190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/75188"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=74651"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=74651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}