{"id":7045,"date":"2023-07-31T14:37:12","date_gmt":"2023-07-31T14:37:12","guid":{"rendered":"https:\/\/adarma.wpengine.com\/navigating-the-challenges-of-leading-security-operations-in-todays-cyberthreat-landscape-copy\/"},"modified":"2023-08-02T15:27:06","modified_gmt":"2023-08-02T15:27:06","slug":"how-to-defend-against-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/how-to-defend-against-supply-chain-attacks\/","title":{"rendered":"How to Defend Against Supply Chain Attacks"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":7047,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[220,255,256,217],"acf":[],"yoast_head":"\n