{"id":7736,"date":"2022-01-12T12:25:51","date_gmt":"2022-01-12T12:25:51","guid":{"rendered":"https:\/\/outofsite.biz\/cynance\/?p=7736"},"modified":"2022-01-12T12:25:52","modified_gmt":"2022-01-12T12:25:52","slug":"stride-threat-modelling-6-steps-to-secure-apps","status":"publish","type":"post","link":"https:\/\/outofsite.biz\/cynance\/stride-threat-modelling-6-steps-to-secure-apps\/","title":{"rendered":"STRIDE Threat Modelling: Six Steps to a Secure Application"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t