{"id":17829,"date":"2024-10-25T11:24:31","date_gmt":"2024-10-25T09:24:31","guid":{"rendered":"https:\/\/intechhouse.com\/?post_type=blog&p=17829"},"modified":"2024-10-29T08:30:35","modified_gmt":"2024-10-29T07:30:35","slug":"rtos-in-cybersecurity-securing-iot-and-embedded-systems-infrastructure","status":"publish","type":"blog","link":"https:\/\/intechhouse.com\/blog\/rtos-in-cybersecurity-securing-iot-and-embedded-systems-infrastructure\/","title":{"rendered":"RTOS in Cybersecurity: Securing IoT and Embedded Systems Infrastructure"},"content":{"rendered":"","protected":false},"featured_media":0,"parent":0,"template":"","blog-category":[169],"blog-personas":[185],"class_list":["post-17829","blog","type-blog","status-publish","hentry","blog-category-tech","blog-personas-adam-szychulec"],"acf":[],"yoast_head":"\n