{"version":"1.0","provider_name":"","provider_url":"https:\/\/www.99techpost.com","author_name":"99 Tech Post","author_url":"https:\/\/www.99techpost.com\/author\/admin\/","title":"Email Gateway Protection: Building Comprehensive Defense Against Modern Threats -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qJFMdWVvAc\"><a href=\"https:\/\/www.99techpost.com\/email-gateway-protection-building-defense-against-threats\/\">Email Gateway Protection: Building Comprehensive Defense Against Modern Threats<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.99techpost.com\/email-gateway-protection-building-defense-against-threats\/embed\/#?secret=qJFMdWVvAc\" width=\"600\" height=\"338\" title=\"&#8220;Email Gateway Protection: Building Comprehensive Defense Against Modern Threats&#8221; &#8212; \" data-secret=\"qJFMdWVvAc\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.99techpost.com\/wp-content\/uploads\/2021\/07\/Cyber-security-tips-2.jpg","thumbnail_width":800,"thumbnail_height":500,"description":"The digital transformation of business communications has fundamentally altered how organizations approach cybersecurity. While email remains the backbone of professional communication, it has simultaneously become the most exploited attack vector ... Read More"}