{"version":"1.0","provider_name":"Blog | GitProtect.io","provider_url":"https:\/\/gitprotect.io\/blog","author_name":"Daria Kulikova, Content Writer at GitProtect.io","author_url":"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/","title":"Security Compliance Best Practices - Blog | GitProtect.io","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0SgZG4G838\"><a href=\"https:\/\/gitprotect.io\/blog\/security-compliance-best-practices\/\">Security Compliance Best Practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/gitprotect.io\/blog\/security-compliance-best-practices\/embed\/#?secret=0SgZG4G838\" width=\"600\" height=\"338\" title=\"&#8220;Security Compliance Best Practices&#8221; &#8212; Blog | GitProtect.io\" data-secret=\"0SgZG4G838\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/03\/Security-Compliance-best-practices-v4.png","thumbnail_width":1200,"thumbnail_height":600,"description":"In view of the constantly emerging threats, more and more companies are understanding that they need to level up their responses to risks and adopt more strategic compliance operations, leaving checkbox compliance behind."}