{"version":"1.0","provider_name":"Blog | GitProtect.io","provider_url":"https:\/\/gitprotect.io\/blog","author_name":"Daria Kulikova, Content Writer at GitProtect.io","author_url":"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/","title":"Cyber Resilience Act: What Does It Mean For Your Digital Business? - Blog | GitProtect.io","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"aO5Snlodw0\"><a href=\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/\">Cyber Resilience Act: What Does It Mean For Your Digital Business?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/embed\/#?secret=aO5Snlodw0\" width=\"600\" height=\"338\" title=\"&#8220;Cyber Resilience Act: What Does It Mean For Your Digital Business?&#8221; &#8212; Blog | GitProtect.io\" data-secret=\"aO5Snlodw0\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png","thumbnail_width":1200,"thumbnail_height":600,"description":"Software developers push thousands of lines of code every day, helping enterprises shape the tools and applications we all rely on, starting from banking to entertainment. However, we shouldn\u2019t forget that behind every successful deployment lies a hidden challenge &#8211; what cyber security measures should be taken to protect the source code, hardware and software products, and critical company and customer data?\u00a0"}