{"version":"1.0","provider_name":"Integration Objects","provider_url":"https:\/\/integrationobjects.com\/fr\/","author_name":"admin_io","author_url":"https:\/\/integrationobjects.com\/fr\/author\/admin_io\/","title":"Industrial Cybersecurity - Integration Objects","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"igh9tauvOx\"><a href=\"https:\/\/integrationobjects.com\/fr\/service\/industrial-cybersecurity\/\">Industrial Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/integrationobjects.com\/fr\/service\/industrial-cybersecurity\/embed\/#?secret=igh9tauvOx\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Industrial Cybersecurity\u00a0\u00bb &#8212; Integration Objects\" data-secret=\"igh9tauvOx\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Protect your assets and operations from external threats with IT-OT Integrated security With the Industrial Internet of Things (IIoT) and digital transformation paving the way for interconnective systems across the enterprise, organizations are faced with more access points for cyber criminals to exploit. The cyber threat\u00a0landscape has changed and companies of every size and sector [&hellip;]"}