{"id":6473,"date":"2022-09-07T13:38:55","date_gmt":"2022-09-07T13:38:55","guid":{"rendered":"https:\/\/adarma.wpengine.com\/five-best-practices-for-cisos-when-speaking-to-the-board-copy\/"},"modified":"2023-08-16T15:35:43","modified_gmt":"2023-08-16T15:35:43","slug":"keeping-the-cloud-safe-from-security-misconfigurations","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/keeping-the-cloud-safe-from-security-misconfigurations\/","title":{"rendered":"Keeping the cloud safe from security misconfigurations"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":6472,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[196],"tags":[249,231,211],"acf":[],"yoast_head":"\n