<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>TechTonic Times</provider_name><provider_url>https://www.abrahamsconsulting.com/blog</provider_url><title>Securing software, together - TechTonic Times</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="e0CIQ9kVQP"&gt;&lt;a href="https://www.abrahamsconsulting.com/blog/securing-software-together/"&gt;Securing software, together&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.abrahamsconsulting.com/blog/securing-software-together/embed/#?secret=e0CIQ9kVQP" width="600" height="338" title="&#x201C;Securing software, together&#x201D; &#x2014; TechTonic Times" data-secret="e0CIQ9kVQP" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.abrahamsconsulting.com/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.abrahamsconsulting.com/blog/wp-content/uploads/2021/11/azure_c1_w8_infogthumb_png.png</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>628</thumbnail_height><description>On GitHub, teams work together to secure the world's software at every step. Empower your security team to fully control your entire cloud security state, what environments exist, and who can access them. Learn more out the four pillars of GitHub's approach to security and why it's the development platform for Microsoft DevOps.</description></oembed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: www.abrahamsconsulting.com @ 2026-05-16 18:00:24 by W3 Total Cache
-->