{"id":6195,"date":"2022-06-07T08:08:54","date_gmt":"2022-06-07T08:08:54","guid":{"rendered":"https:\/\/adarma.wpengine.com\/?p=6195"},"modified":"2023-08-17T08:29:12","modified_gmt":"2023-08-17T08:29:12","slug":"cloud-security-understanding-and-managing-third-party-risk","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/cloud-security-understanding-and-managing-third-party-risk\/","title":{"rendered":"Cloud Security Part 2: Understanding & Managing Third Party Risk"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":6197,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[232,231,222,220,211,235],"acf":[],"yoast_head":"\n