{"id":8014,"date":"2022-06-09T11:49:57","date_gmt":"2022-06-09T11:49:57","guid":{"rendered":"https:\/\/outofsite.biz\/cynance\/?p=8014"},"modified":"2022-06-09T11:50:53","modified_gmt":"2022-06-09T11:50:53","slug":"how-to-prevent-software-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/outofsite.biz\/cynance\/how-to-prevent-software-supply-chain-attacks\/","title":{"rendered":"Are you the weakest link? How to prevent software supply chain attacks"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t