{"version":"1.0","provider_name":"Sistemas Sightline: Monitoramento e an\u00e1lise para otimizar seus neg\u00f3cios","provider_url":"https:\/\/www.sightline.com\/br","author_name":"Brandon Witte","author_url":"https:\/\/www.sightline.com\/br\/author\/witteb1\/","title":"Zero-Trust Data Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"H40Hp9ZK4D\"><a href=\"https:\/\/www.sightline.com\/br\/zero-trust-data-security\/blogs\/\">Seguran\u00e7a de dados Zero-Trust<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.sightline.com\/br\/zero-trust-data-security\/blogs\/embed\/#?secret=H40Hp9ZK4D\" width=\"600\" height=\"338\" title=\"\u201cSeguran\u00e7a de dados Zero-Trust\u201d - Sightline Systems: Monitoramento e an\u00e1lise para otimizar seus neg\u00f3cios\" data-secret=\"H40Hp9ZK4D\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.sightline.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/www.sightline.com\/wp-content\/uploads\/Zero-Trust-Security.png","thumbnail_width":2880,"thumbnail_height":1620,"description":"Zero-Trust is a security concept and cybersecurity framework allowing an organization to aggressively defend itself, its data, and user permissions using an advanced system of automated security protocols. Zero-Trust is centered on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify anything and everything trying to connect to their systems before granting access."}