{"version":"1.0","provider_name":"Cyber 4.0","provider_url":"https:\/\/www.cyber40.it\/en\/","author_name":"Cyber 4.0","author_url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/","title":"Security certifications: a rapidly changing scenario - Cyber 4.0","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"pGrAoHUeu9\"><a href=\"https:\/\/www.cyber40.it\/en\/security-certifications-a-rapidly-changing-scenario\/\">Security certifications: a rapidly changing scenario<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyber40.it\/en\/security-certifications-a-rapidly-changing-scenario\/embed\/#?secret=pGrAoHUeu9\" width=\"600\" height=\"338\" title=\"&#8220;Security certifications: a rapidly changing scenario&#8221; &#8212; Cyber 4.0\" data-secret=\"pGrAoHUeu9\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Copia-di-post-Linkedin-6.png","thumbnail_width":600,"thumbnail_height":600,"description":"The first event in the series of webinars that Cyber 4.0, in collaboration with ACN, is devoting to delving into some of the important aspects of the National Cybersecurity Strategy was held on Wednesday, July 6. The seminar was devoted to the topics of technology scrutiny and security certification, a topic of strong interest and..."}