{
  "version": "https://jsonfeed.org/version/1.1",
  "title": "SecValley Insights",
  "home_page_url": "https://www.secvalley.com/insights/",
  "feed_url": "https://www.secvalley.com/feed.json",
  "description": "Cybersecurity insights, cloud security best practices, and threat analysis from the SecValley team. Microsoft 365, Entra ID, and Azure security focus.",
  "language": "en-US",
  "icon": "https://www.secvalley.com/images/logo.png",
  "favicon": "https://www.secvalley.com/favicon/favicon-32x32.png",
  "authors": [
    {
      "name": "SecValley",
      "url": "https://www.secvalley.com"
    }
  ],
  "items": [
    {
      "id": "https://www.secvalley.com/insights/service-principal-sprawl/",
      "url": "https://www.secvalley.com/insights/service-principal-sprawl/",
      "title": "Service Principal Sprawl: The Identity Class Nobody Audits",
      "content_text": "Service Principal Sprawl: The Identity Class Nobody Audits",
      "summary": "",
      "date_published": "2026-05-08T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/service-principal-sprawl.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/conditional-access-misconfigurations/",
      "url": "https://www.secvalley.com/insights/conditional-access-misconfigurations/",
      "title": "Conditional Access Misconfigurations: The 7 Patterns We See in Every Tenant",
      "content_text": "Conditional Access Misconfigurations: The 7 Patterns We See in Every Tenant",
      "summary": "",
      "date_published": "2026-04-30T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/conditional-access-misconfigurations.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/token-theft-mfa-bypass/",
      "url": "https://www.secvalley.com/insights/token-theft-mfa-bypass/",
      "title": "Token Theft: Why MFA Isn't Stopping the Modern Attacker",
      "content_text": "Token Theft: Why MFA Isn't Stopping the Modern Attacker",
      "summary": "",
      "date_published": "2026-04-23T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/token-theft-mfa-bypass.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/shadow-it-shadow-cloud/",
      "url": "https://www.secvalley.com/insights/shadow-it-shadow-cloud/",
      "title": "Shadow IT and Shadow Cloud: The Risk You Can't See",
      "content_text": "Shadow IT and Shadow Cloud: The Risk You Can't See",
      "summary": "",
      "date_published": "2026-04-14T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/shadow-it-cloud.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/living-off-the-land-lolbins/",
      "url": "https://www.secvalley.com/insights/living-off-the-land-lolbins/",
      "title": "Living Off the Land (LOLBins): When Attackers Use Your Own Tools",
      "content_text": "Living Off the Land (LOLBins): When Attackers Use Your Own Tools",
      "summary": "",
      "date_published": "2026-04-08T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/living-off-the-land-lolbins.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/supply-chain-attacks/",
      "url": "https://www.secvalley.com/insights/supply-chain-attacks/",
      "title": "Supply Chain Attacks: When Trusted Software Betrays You",
      "content_text": "Supply Chain Attacks: When Trusted Software Betrays You",
      "summary": "",
      "date_published": "2026-03-30T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/supply-chain-attacks.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/what-is-dspm/",
      "url": "https://www.secvalley.com/insights/what-is-dspm/",
      "title": "What is DSPM? Data Security Posture Management",
      "content_text": "What is DSPM? Data Security Posture Management",
      "summary": "",
      "date_published": "2026-03-19T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/what-is-dspm.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/lateral-movement/",
      "url": "https://www.secvalley.com/insights/lateral-movement/",
      "title": "Lateral Movement: How Attackers Navigate Your Network",
      "content_text": "Lateral Movement: How Attackers Navigate Your Network",
      "summary": "",
      "date_published": "2026-03-14T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/lateral-movement.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/zero-trust-architecture/",
      "url": "https://www.secvalley.com/insights/zero-trust-architecture/",
      "title": "Zero Trust Architecture: A Practical Guide",
      "content_text": "Zero Trust Architecture: A Practical Guide",
      "summary": "",
      "date_published": "2026-03-11T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/zero-trust-architecture.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/what-is-cloud-misconfiguration/",
      "url": "https://www.secvalley.com/insights/what-is-cloud-misconfiguration/",
      "title": "What is a Cloud Misconfiguration? Definition & Examples",
      "content_text": "What is a Cloud Misconfiguration? Definition & Examples",
      "summary": "",
      "date_published": "2026-02-28T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/cloud-misconfiguration.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/post-quantum-cryptography/",
      "url": "https://www.secvalley.com/insights/post-quantum-cryptography/",
      "title": "Post-Quantum Cryptography: The Clock Is Ticking on Your Encryption",
      "content_text": "Post-Quantum Cryptography: The Clock Is Ticking on Your Encryption",
      "summary": "",
      "date_published": "2026-02-27T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/post-quantum-cryptography.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/what-is-cloud-compliance/",
      "url": "https://www.secvalley.com/insights/what-is-cloud-compliance/",
      "title": "What is Cloud Compliance? Key Frameworks & How CSPM Helps",
      "content_text": "What is Cloud Compliance? Key Frameworks & How CSPM Helps",
      "summary": "",
      "date_published": "2026-02-25T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/cloud-compliance.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/ai-in-cybersecurity/",
      "url": "https://www.secvalley.com/insights/ai-in-cybersecurity/",
      "title": "AI in Cybersecurity: Defender, Weapon, or Both?",
      "content_text": "AI in Cybersecurity: Defender, Weapon, or Both?",
      "summary": "",
      "date_published": "2026-02-23T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/ai-cybersecurity.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/what-is-iac-security/",
      "url": "https://www.secvalley.com/insights/what-is-iac-security/",
      "title": "What is IaC Security? Infrastructure as Code Security Explained",
      "content_text": "What is IaC Security? Infrastructure as Code Security Explained",
      "summary": "",
      "date_published": "2026-02-22T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/iac-security.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/what-is-casb/",
      "url": "https://www.secvalley.com/insights/what-is-casb/",
      "title": "What is CASB? Cloud Access Security Broker",
      "content_text": "What is CASB? Cloud Access Security Broker",
      "summary": "",
      "date_published": "2026-02-19T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/what-is-casb.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/what-is-ciem/",
      "url": "https://www.secvalley.com/insights/what-is-ciem/",
      "title": "What is CIEM? Cloud Infrastructure Entitlement Management",
      "content_text": "What is CIEM? Cloud Infrastructure Entitlement Management",
      "summary": "",
      "date_published": "2026-02-16T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/what-is-ciem.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/ransomware-defense-strategies/",
      "url": "https://www.secvalley.com/insights/ransomware-defense-strategies/",
      "title": "Ransomware Defense: Stop Paying, Start Preparing",
      "content_text": "Ransomware Defense: Stop Paying, Start Preparing",
      "summary": "",
      "date_published": "2026-02-14T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/ransomware-defense.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/what-is-cwpp/",
      "url": "https://www.secvalley.com/insights/what-is-cwpp/",
      "title": "What is CWPP? Cloud Workload Protection Platform",
      "content_text": "What is CWPP? Cloud Workload Protection Platform",
      "summary": "",
      "date_published": "2026-02-12T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/what-is-cwpp.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/rpo-rto-recovery-objectives/",
      "url": "https://www.secvalley.com/insights/rpo-rto-recovery-objectives/",
      "title": "RPO and RTO: The Numbers That Define Your Disaster Recovery",
      "content_text": "RPO and RTO: The Numbers That Define Your Disaster Recovery",
      "summary": "",
      "date_published": "2026-02-11T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/rpo-rto-recovery-objectives.jpg"
    },
    {
      "id": "https://www.secvalley.com/insights/oauth2-security-flaws/",
      "url": "https://www.secvalley.com/insights/oauth2-security-flaws/",
      "title": "OAuth 2.0 Security: The Authorization Flaws Nobody Checks",
      "content_text": "OAuth 2.0 Security: The Authorization Flaws Nobody Checks",
      "summary": "",
      "date_published": "2026-02-08T00:00:00.000Z",
      "tags": [],
      "authors": [
        {
          "name": "SecValley"
        }
      ],
      "image": "https://www.secvalley.com/images/uploads/oauth2-security-flaws.jpg"
    }
  ]
}