{"version":"1.0","provider_name":"KYOS","provider_url":"https:\/\/www.kyos.ch\/en\/","title":"Perimeter and Content - KYOS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"HSv0iTQtn8\"><a href=\"https:\/\/www.kyos.ch\/en\/security\/perimeter-content\/\">Perimeter and Content<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.kyos.ch\/en\/security\/perimeter-content\/embed\/#?secret=HSv0iTQtn8\" width=\"600\" height=\"338\" title=\"&#8220;Perimeter and Content&#8221; &#8212; KYOS\" data-secret=\"HSv0iTQtn8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.kyos.ch\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Main Menu Audit and Pentests Identity and Access Perimeter and Content Endpoint Data and Encryption Training Event Management Perimeter and content security The increasing use of cloud solutions, remote working and automated data exchange makes architectures more complex, which implies an evolution of perimeter and content security concepts. In addition, the evolution of Internet threats [&hellip;]"}