{"id":13222,"date":"2023-09-16T18:11:34","date_gmt":"2023-09-16T23:11:34","guid":{"rendered":"https:\/\/texascyber.org\/?post_type=sponsor_post&p=13222"},"modified":"2023-09-16T18:11:34","modified_gmt":"2023-09-16T23:11:34","slug":"logicgate","status":"publish","type":"sponsor_post","link":"https:\/\/texascyber.org\/sponsor\/logicgate\/","title":{"rendered":"Logicgate"},"content":{"rendered":"
Link cyber threats to tangible business outcomes. Add context to any decision, prioritize remediation, and report what matters most to your key stakeholders.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"featured_media":13223,"template":"","sponsor_level":[9],"sponsored_year":[],"acf":[],"yoast_head":"\n