{"total":3,"offset":0,"limit":3,"data":[{"title":"RSAC 2025 Expo Recap: Goats, Puppies, and Threat Intelligence","link":"/blog/rsac-recap","image":"https://www.recordedfuture.com/graphics/resources/rsa-2025.jpg","date":"May 1, 2025","description":"","contentTag":""},{"title":"Transforming Malware Defense for the AI Era","link":"/blog/transforming-malware-defense","image":"https://www.recordedfuture.com/graphics/resources/malware-launch.jpeg","date":"April 28, 2025","description":"","contentTag":""},{"title":"How Security Leaders Defend Their First- and Third-Party Attack Surfaces","link":"/blog/how-security-leaders-defend-their-attack-surface","image":"https://aem.www.recordedfuture.com/graphics/resources/how-security-leaders.jpeg","date":"Feb 24, 2025","description":"","contentTag":""}],"columns":["title","link","image","date","description","contentTag"],":type":"sheet"}