{"version":"1.0","provider_name":"Community","provider_url":"https:\/\/www.tsfactory.com\/forums","title":"Traditional cybersecurity measures are no longer enough - Community","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5SQnzrHPqD\"><a href=\"https:\/\/www.tsfactory.com\/forums\/blog\/traditional-cybersecurity-measures-are-no-longer-enough\/\">Traditional cybersecurity measures are no longer enough<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.tsfactory.com\/forums\/blog\/traditional-cybersecurity-measures-are-no-longer-enough\/embed\/#?secret=5SQnzrHPqD\" width=\"600\" height=\"338\" title=\"&#8220;Traditional cybersecurity measures are no longer enough&#8221; &#8212; Community\" data-secret=\"5SQnzrHPqD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.tsfactory.com\/forums\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/01\/pexels-mikhail-nilov-7534101.jpg","thumbnail_width":1280,"thumbnail_height":853,"description":"Traditional cybersecurity measures are no longer sufficient to defend against sophisticated attacks, particularly those powered by artificial intelligence (AI). Threat actors are constantly innovating and exploiting vulnerabilities in interconnected digital environments, including cloud-based infrastructures and remote work setups. Regulatory requirements and customer expectations on data privacy and protection continue to evolve, driving the need for [&hellip;]"}