{"version":"1.0","provider_name":"Security Macromorphosis","provider_url":"https:\/\/www.seven-stones.biz\/blog","author_name":"itibble@gmail.com","author_url":"https:\/\/www.seven-stones.biz\/blog\/author\/itibblegmail-com\/","title":"Fintechs and Security - Part 4 - Security Macromorphosis","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bFauGf2UNT\"><a href=\"https:\/\/www.seven-stones.biz\/blog\/fintechs-and-security-part-4\/\">Fintechs and Security &#8211; Part 4<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.seven-stones.biz\/blog\/fintechs-and-security-part-4\/embed\/#?secret=bFauGf2UNT\" width=\"600\" height=\"338\" title=\"&#8220;Fintechs and Security &#8211; Part 4&#8221; &#8212; Security Macromorphosis\" data-secret=\"bFauGf2UNT\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/pizza.jpg","thumbnail_width":800,"thumbnail_height":533,"description":"Prologue\u00a0\u2013 covers the overall challenge at a high level Part One\u00a0\u2013 Recruiting and Interviews Part Two\u00a0\u2013 Threat and Vulnerability Management \u2013 Application Security Part Three\u00a0\u2013 Threat and Vulnerability Management \u2013 Other Layers Part Four \u2013 Logging Part Five \u2013 Cryptography &hellip; Continue reading &rarr;"}