{"id":2990,"date":"2025-11-11T10:13:57","date_gmt":"2025-11-11T10:13:57","guid":{"rendered":"https:\/\/ventum-infosec.com\/?p=2990"},"modified":"2025-11-11T13:15:45","modified_gmt":"2025-11-11T13:15:45","slug":"%f0%9f%9a%a8-%f0%9d%97%9c%f0%9d%97%94%f0%9d%97%a0-%f0%9d%97%a7%f0%9d%97%aa%f0%9d%97%a2-%f0%9d%97%a6%f0%9d%97%a7%f0%9d%97%98%f0%9d%97%a3%f0%9d%97%a6-%f0%9d%97%99%f0%9d%97%a5%f0%9d%97%a2%f0%9d%97%a0-2","status":"publish","type":"post","link":"https:\/\/ventum-infosec.com\/en\/%f0%9f%9a%a8-%f0%9d%97%9c%f0%9d%97%94%f0%9d%97%a0-%f0%9d%97%a7%f0%9d%97%aa%f0%9d%97%a2-%f0%9d%97%a6%f0%9d%97%a7%f0%9d%97%98%f0%9d%97%a3%f0%9d%97%a6-%f0%9d%97%99%f0%9d%97%a5%f0%9d%97%a2%f0%9d%97%a0-2\/","title":{"rendered":"\ud83d\udea8 \ud835\udddc\ud835\uddd4\ud835\udde0 \ud835\udde7\ud835\uddea\ud835\udde2 \ud835\udde6\ud835\udde7\ud835\uddd8\ud835\udde3\ud835\udde6 \ud835\uddd9\ud835\udde5\ud835\udde2\ud835\udde0 \ud835\udddb\ud835\uddd8\ud835\udddf\ud835\udddf \u2014 \ud835\uddd8\ud835\udde3\ud835\udddc\ud835\udde6\ud835\udde2\ud835\uddd7\ud835\uddd8 \ud835\udff0                                         \ud835\uddd9\ud835\uddff\ud835\uddfc\ud835\uddfa \ud835\uddfd\ud835\uddff\ud835\uddfc\ud835\uddfa\ud835\uddfd\ud835\ude01 \ud835\ude01\ud835\uddfc \ud835\uddfd\ud835\uddee\ud835\uddfb\ud835\uddf6\ud835\uddf0: \ud835\uddf9\ud835\uddf2\ud835\ude01 \ud835\uddda\ud835\udde3\ud835\udde7 \ud835\uddf1\ud835\uddff\ud835\uddf6\ud835\ude03\ud835\uddf2 \ud835\udddc\ud835\uddd4\ud835\udde0"},"content":{"rendered":"<p>In this episode:<br><br>\ud83d\udd39 Why AI-generated data isn&#8217;t always trustworthy<br>\ud83d\udd39 How a single smiley may bring down a system<br>\ud83d\udd39 What you can do to prevent it<br><br>\ud83d\udc49 Next up: IAM Performance tuning &#8211; Why not just &#8222;add CPU and pray&#8220;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7363464916705370112\">LinkedIn Post<\/a> <\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2991\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/1-2-819x1024.png\" alt=\"\" class=\"wp-image-2991\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2992\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/2-1-819x1024.png\" alt=\"\" class=\"wp-image-2992\"\/><\/figure>\n<\/figure>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2994\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/3-3-819x1024.png\" alt=\"\" class=\"wp-image-2994\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2998\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/4-7-819x1024.png\" alt=\"\" class=\"wp-image-2998\"\/><\/figure>\n<\/figure>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\"><\/figure>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2999\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/5-5-819x1024.png\" alt=\"\" class=\"wp-image-2999\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"3000\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/6-4-819x1024.png\" alt=\"\" class=\"wp-image-3000\"\/><\/figure>\n<\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/7-4-819x1024.png\" alt=\"\" class=\"wp-image-3001\"\/><\/figure>","protected":false},"excerpt":{"rendered":"<p>In this episode: \ud83d\udd39 Why AI-generated data isn&#8217;t always trustworthy\ud83d\udd39 How a single smiley may bring down a system\ud83d\udd39 What you can do to prevent it \ud83d\udc49 Next up: IAM Performance tuning &#8211; Why not just &#8222;add CPU and pray&#8220; LinkedIn Post<\/p>","protected":false},"author":12,"featured_media":3077,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[94],"tags":[24,93],"class_list":["post-2990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iam-two-steps-from-hell","tag-digital-identity","tag-iam-two-steps-from-hell"],"acf":[],"_links":{"self":[{"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/posts\/2990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/comments?post=2990"}],"version-history":[{"count":2,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/posts\/2990\/revisions"}],"predecessor-version":[{"id":3024,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/posts\/2990\/revisions\/3024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/media\/3077"}],"wp:attachment":[{"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/media?parent=2990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/categories?post=2990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/tags?post=2990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}