<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Why Security</provider_name><provider_url>https://www.whysecurity.it/en/</provider_url><author_name>whysecWP</author_name><author_url>https://www.whysecurity.it/en/author/whysecwp/</author_url><title>Network Security - Why Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="czH2S8CW7Y"&gt;&lt;a href="https://www.whysecurity.it/en/network-security/"&gt;Network Security&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.whysecurity.it/en/network-security/embed/#?secret=czH2S8CW7Y" width="600" height="338" title="&#x201C;Network Security&#x201D; &#x2014; Why Security" data-secret="czH2S8CW7Y" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.whysecurity.it/wp-content/uploads/2021/09/iStock-1166272744-e1630580359932-1.jpg</thumbnail_url><thumbnail_width>1264</thumbnail_width><thumbnail_height>368</thumbnail_height><description>[vc_row full_width=&#x201D;stretch_row&#x201D; css_animation=&#x201D;bounceInDown&#x201D; gradient_colors=&#x201D;%5B%7B%7D%5D&#x201D; css=&#x201D;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#x201D;][vc_column][vc_custom_heading text=&#x201D;Network Security&#x201D; font_container=&#x201D;tag:h2|font_size:44px|text_align:center|color:%23000000&#x2033; google_fonts=&#x201D;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#x201D;][common_title title=&#x201D;&#x201D; show_decor=&#x201D;true&#x201D;][vc_column_text css_animation=&#x201D;fadeInRight&#x201D;]Network security today requires a completely different approach than in the past. Our approach is to carefully map what resources should be available to whom or what. The subdivision of the network and access only to the resources necessary both [&hellip;]</description></oembed>
