{"version":"1.0","provider_name":"Softeng","provider_url":"https:\/\/www.softeng.es\/en\/","author_name":"Daniel Navarro","author_url":"https:\/\/www.softeng.es\/en\/blog\/author\/danielnliftingroup-com\/","title":"How to get out of the cybersecurity maze - Softeng","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"riXDMQnfra\"><a href=\"https:\/\/www.softeng.es\/en\/blog\/how-to-get-out-of-the-cybersecurity-maze\/\">How to get out of the cybersecurity maze<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.softeng.es\/en\/blog\/how-to-get-out-of-the-cybersecurity-maze\/embed\/#?secret=riXDMQnfra\" width=\"600\" height=\"338\" title=\"&#8220;How to get out of the cybersecurity maze&#8221; &#8212; Softeng\" data-secret=\"riXDMQnfra\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.softeng.es\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/softengpro-70ed12f7b2-hffch2b7behabaau.z02.azurefd.net\/blobsoftengpro70ed12f7b2\/wp-content\/uploads\/2022\/04\/Los-3-retos-esenciales-del-CISO-y-sus-claves-para-abordarlos-Blog-1.png","thumbnail_width":1500,"thumbnail_height":1229,"description":"[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;] Technological progress has changed the rules of the game in business and the way we work, opening new paths to enhance productivity and increase business efficiency. But also new risks associated with remote work, devices, information\u2026, which place cybersecurity at the forefront of company priorities. To better understand its complexity and be able [&hellip;]"}