{"id":6603,"date":"2022-11-16T16:38:24","date_gmt":"2022-11-16T16:38:24","guid":{"rendered":"https:\/\/adarma.wpengine.com\/cybersecurity-awareness-month-copy\/"},"modified":"2023-08-17T08:29:51","modified_gmt":"2023-08-17T08:29:51","slug":"moving-beyond-the-external-attack-surface","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/through-the-eyes-of-the-adversary\/","title":{"rendered":"Through the Eyes of the Adversary: Moving Beyond the External Attack Surface"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":6499,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[257,260,255],"acf":[],"yoast_head":"\n