{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/zh-hans\/","author_name":"David Puner","author_url":"https:\/\/www.cyberark.com\/zh-hans\/blog\/author\/dpuner\/","title":"EP 57 - Proactive Defense: Security's AI Infusion","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"nLuGJ7neNs\"><a href=\"https:\/\/www.cyberark.com\/zh-hans\/podcasts\/ep-57-proactive-defense-securitys-ai-infusion\/\">EP 57 &#8211; Proactive Defense: Security&#8217;s AI Infusion<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/zh-hans\/podcasts\/ep-57-proactive-defense-securitys-ai-infusion\/embed\/#?secret=nLuGJ7neNs\" width=\"600\" height=\"338\" title=\"\u300a EP 57 &#8211; Proactive Defense: Security&#8217;s AI Infusion \u300b\u2014CyberArk\" data-secret=\"nLuGJ7neNs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/NGM5YS5qcGc-1.jpg","thumbnail_width":1400,"thumbnail_height":1400,"description":"In this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk\u2019s Chief Product Officer, joins host David Puner, for a discussion about how AI is reshaping cyb..."}