{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/es\/","author_name":"David Puner","author_url":"https:\/\/www.cyberark.com\/es\/blog\/author\/dpuner\/","title":"EP 57 - Proactive Defense: Security's AI Infusion","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Q9SYfZkAEf\"><a href=\"https:\/\/www.cyberark.com\/es\/podcasts\/ep-57-proactive-defense-securitys-ai-infusion\/\">EP 57 &#8211; Proactive Defense: Security&#8217;s AI Infusion<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/es\/podcasts\/ep-57-proactive-defense-securitys-ai-infusion\/embed\/#?secret=Q9SYfZkAEf\" width=\"600\" height=\"338\" title=\"\u00abEP 57 &#8211; Proactive Defense: Security&#8217;s AI Infusion\u00bb \u2014 CyberArk\" data-secret=\"Q9SYfZkAEf\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/NGM5YS5qcGc-1.jpg","thumbnail_width":1400,"thumbnail_height":1400,"description":"In this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk\u2019s Chief Product Officer, joins host David Puner, for a discussion about..."}