[{"id":67,"link":"https:\/\/cyberautomate.org\/?p=67","name":"top-10-cybersecurity-best-practices-for-small-businesses","thumbnail":{"url":false,"alt":false},"title":"Top 10 Cybersecurity Best Practices for Small Businesses","author":{"name":"zukili","link":"https:\/\/cyberautomate.org\/?author=1"},"date":"Oct 23, 2025","dateGMT":"2025-10-23 18:53:08","modifiedDate":"2025-10-23 18:53:09","modifiedDateGMT":"2025-10-23 18:53:09","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyberautomate.org\/?cat=1\" rel=\"category\">Home<\/a>","space":"<a href=\"https:\/\/cyberautomate.org\/?cat=1\" rel=\"category\">Home<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":0},"status":"publish","excerpt":""},{"id":65,"link":"https:\/\/cyberautomate.org\/?p=65","name":"cybersecurity-automation-how-its-changing-threat-response","thumbnail":{"url":false,"alt":false},"title":"Cybersecurity Automation: How It\u2019s Changing Threat Response","author":{"name":"zukili","link":"https:\/\/cyberautomate.org\/?author=1"},"date":"Oct 23, 2025","dateGMT":"2025-10-23 18:52:48","modifiedDate":"2025-10-23 18:52:48","modifiedDateGMT":"2025-10-23 18:52:48","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyberautomate.org\/?cat=1\" rel=\"category\">Home<\/a>","space":"<a href=\"https:\/\/cyberautomate.org\/?cat=1\" rel=\"category\">Home<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":0},"status":"publish","excerpt":""},{"id":63,"link":"https:\/\/cyberautomate.org\/?p=63","name":"what-is-identity-and-access-management-iam-a-complete-beginners-guide","thumbnail":{"url":false,"alt":false},"title":"What Is Identity and Access Management (IAM)? A Complete Beginner\u2019s Guide","author":{"name":"zukili","link":"https:\/\/cyberautomate.org\/?author=1"},"date":"Oct 23, 2025","dateGMT":"2025-10-23 18:52:16","modifiedDate":"2025-10-23 18:52:16","modifiedDateGMT":"2025-10-23 18:52:16","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyberautomate.org\/?cat=1\" rel=\"category\">Home<\/a>","space":"<a href=\"https:\/\/cyberautomate.org\/?cat=1\" rel=\"category\">Home<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":0},"status":"publish","excerpt":""}]