{"id":6349,"date":"2022-07-18T13:45:01","date_gmt":"2022-07-18T13:45:01","guid":{"rendered":"https:\/\/adarma.wpengine.com\/top-3-cloud-attacks-you-should-know-about-copy\/"},"modified":"2023-08-17T09:12:42","modified_gmt":"2023-08-17T09:12:42","slug":"managing-threat-exposure-in-a-cloud-smart-world","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/managing-threat-exposure-in-a-cloud-smart-world\/","title":{"rendered":"Computing Webinar: Managing Threat Exposure in a Cloud-Smart World"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":6351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[249,231,222,211],"acf":[],"yoast_head":"\n