{"version":"1.0","provider_name":"","provider_url":"https:\/\/www.99techpost.com","author_name":"99 Tech Post","author_url":"https:\/\/www.99techpost.com\/author\/admin\/","title":"Securing Your Network's Future: Leveraging Attack Path Analysis for Protection -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zE7bZVTBvT\"><a href=\"https:\/\/www.99techpost.com\/securing-your-networks-future-leveraging-attack-path-analysis-for-protection\/\">Securing Your Network&#8217;s Future: Leveraging Attack Path Analysis for Protection<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.99techpost.com\/securing-your-networks-future-leveraging-attack-path-analysis-for-protection\/embed\/#?secret=zE7bZVTBvT\" width=\"600\" height=\"338\" title=\"&#8220;Securing Your Network&#8217;s Future: Leveraging Attack Path Analysis for Protection&#8221; &#8212; \" data-secret=\"zE7bZVTBvT\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.99techpost.com\/wp-content\/uploads\/2021\/07\/Cyber-security-tips-2.jpg","thumbnail_width":800,"thumbnail_height":500,"description":"In today&#8217;s digital landscape, where cyber threats lurk around every virtual corner, securing your network is more crucial than ever before. As businesses increasingly rely on interconnected systems and data ... Read More"}