1.0CDInsightshttps://www.clouddatainsights.comDavid Curryhttps://www.clouddatainsights.com/author/david-curry/Cloud Security: A Primer - CDInsightsrich600338<blockquote class="wp-embedded-content" data-secret="b9omTW6m7T"><a href="https://www.clouddatainsights.com/cloud-security-a-primer/">Cloud Security: A Primer</a></blockquote><iframe sandbox="allow-scripts" security="restricted" src="https://www.clouddatainsights.com/cloud-security-a-primer/embed/#?secret=b9omTW6m7T" width="600" height="338" title="“Cloud Security: A Primer” — CDInsights" data-secret="b9omTW6m7T" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"></iframe><script> /*! This file is auto-generated */ !function(d,l){"use strict";l.querySelector&&d.addEventListener&&"undefined"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i<o.length;i++)o[i].style.display="none";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute("style"),"height"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):"link"===t.message&&(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document); </script> https://www.clouddatainsights.com/wp-content/uploads/2022/05/cloud-secirity-2-Depositphotos_179973912_S-e1653275954379.jpg300223Cloud security encompasses security, compliance, and governance procedures that prevent unauthorized access and threats to cloud databases.
This XML file does not appear to have any style information associated with it. The document tree is shown below.
<oembed>
<version>1.0</version>
<provider_name>CDInsights</provider_name>
<provider_url>https://www.clouddatainsights.com</provider_url>
<author_name>David Curry</author_name>
<author_url>https://www.clouddatainsights.com/author/david-curry/</author_url>
<title>Cloud Security: A Primer - CDInsights</title>
<type>rich</type>
<width>600</width>
<height>338</height>
<html><blockquote class="wp-embedded-content" data-secret="b9omTW6m7T"><a href="https://www.clouddatainsights.com/cloud-security-a-primer/">Cloud Security: A Primer</a></blockquote><iframe sandbox="allow-scripts" security="restricted" src="https://www.clouddatainsights.com/cloud-security-a-primer/embed/#?secret=b9omTW6m7T" width="600" height="338" title="“Cloud Security: A Primer” — CDInsights" data-secret="b9omTW6m7T" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"></iframe><script> /*! This file is auto-generated */ !function(d,l){"use strict";l.querySelector&&d.addEventListener&&"undefined"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i<o.length;i++)o[i].style.display="none";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute("style"),"height"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):"link"===t.message&&(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document); </script> </html>
<thumbnail_url>https://www.clouddatainsights.com/wp-content/uploads/2022/05/cloud-secirity-2-Depositphotos_179973912_S-e1653275954379.jpg</thumbnail_url>
<thumbnail_width>300</thumbnail_width>
<thumbnail_height>223</thumbnail_height>
<description>Cloud security encompasses security, compliance, and governance procedures that prevent unauthorized access and threats to cloud databases.</description>
</oembed>