{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/de\/","author_name":"CyberArk","author_url":"https:\/\/www.cyberark.com\/de\/","title":"CyberArk Defines Maturity Model to Securing Privileged Accounts","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"G8J5FFx3Ui\"><a href=\"https:\/\/www.cyberark.com\/de\/press\/cyberark-defines-maturity-model-securing-privileged-accounts\/\">CyberArk Defines Maturity Model to Securing Privileged Accounts<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/de\/press\/cyberark-defines-maturity-model-securing-privileged-accounts\/embed\/#?secret=G8J5FFx3Ui\" width=\"600\" height=\"338\" title=\"&#8222;CyberArk Defines Maturity Model to Securing Privileged Accounts&#8220; &#8212; CyberArk\" data-secret=\"G8J5FFx3Ui\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Best Practices Guide Breaks Down the Process of Locking Down the\u00a0Most Coveted Asset in Advanced and Insider Attacks Newton, Mass. \u2013 April 22, 2014\u00a0\u2013\u00a0CyberArk, the company securing the heart of the enterprise, today released a...","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","thumbnail_width":1024,"thumbnail_height":535}