<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Sistemas Sightline: Monitoramento e an&#xE1;lise para otimizar seus neg&#xF3;cios</provider_name><provider_url>https://www.sightline.com/br</provider_url><author_name>Brandon Witte</author_name><author_url>https://www.sightline.com/br/author/witteb1/</author_url><title>Zero-Trust Data Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="SfQMRGOlEZ"&gt;&lt;a href="https://www.sightline.com/br/zero-trust-data-security/blogs/"&gt;Seguran&#xE7;a de dados Zero-Trust&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.sightline.com/br/zero-trust-data-security/blogs/embed/#?secret=SfQMRGOlEZ" width="600" height="338" title="&#x201C;Seguran&#xE7;a de dados Zero-Trust&#x201D; - Sightline Systems: Monitoramento e an&#xE1;lise para otimizar seus neg&#xF3;cios" data-secret="SfQMRGOlEZ" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.sightline.com/wp-includes/js/wp-embed.min.js
&lt;/script&gt;</html><thumbnail_url>https://www.sightline.com/wp-content/uploads/Zero-Trust-Security.png</thumbnail_url><thumbnail_width>2880</thumbnail_width><thumbnail_height>1620</thumbnail_height><description>Zero-Trust is a security concept and cybersecurity framework allowing an organization to aggressively defend itself, its data, and user permissions using an advanced system of automated security protocols. Zero-Trust is centered on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify anything and everything trying to connect to their systems before granting access.</description></oembed>
