{"version":"1.0","provider_name":"Oxford Global Resources","provider_url":"https:\/\/www.oxfordcorp.com\/nl\/","author_name":"Luke Summers","author_url":"https:\/\/www.oxfordcorp.com\/nl\/insights\/author\/lsummersthiel-com\/","title":"Building Security into Product Development","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"58e5kDN0M5\"><a href=\"https:\/\/www.oxfordcorp.com\/nl\/insights\/blog\/building-security-into-product-development\/\">Building Security into Product Development<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.oxfordcorp.com\/nl\/insights\/blog\/building-security-into-product-development\/embed\/#?secret=58e5kDN0M5\" width=\"600\" height=\"338\" title=\"&#8220;Building Security into Product Development&#8221; &#8212; Oxford Global Resources\" data-secret=\"58e5kDN0M5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.oxfordcorp.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2020\/04\/building_security_into_product_development.jpg","thumbnail_width":1200,"thumbnail_height":675,"description":"When it comes to security in product development, there is a lot to consider, especially now that everything from vehicles to appliances are connected to the internet. Although this connectivity is highly desirable and lucrative in the market, it also opens the door to a slew of security threats."}