{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/de\/","author_name":"Fernanda Walker","author_url":"https:\/\/www.cyberark.com\/de\/blog\/author\/fwalker\/","title":"Kritische Infrastrukturen","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MLo59AnIth\"><a href=\"https:\/\/www.cyberark.com\/de\/solutions\/critical-infrastructure\/\">Kritische Infrastrukturen<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/de\/solutions\/critical-infrastructure\/embed\/#?secret=MLo59AnIth\" width=\"600\" height=\"338\" title=\"&#8222;Kritische Infrastrukturen&#8220; &#8212; CyberArk\" data-secret=\"MLo59AnIth\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"CyberArk Identity Security L\u00f6sungen f\u00fcr kritische Infrastrukturen sichern die Identit\u00e4t jedes Nutzers, sowohl Mensch als auch Maschine, \u00fcber globale wirtschaftliche und physische Systeme hinweg, die wichtige Versorgungsleistungen und \u00f6ffentliche Dienste unterst\u00fctzen."}