{"version":"1.0","provider_name":"TechTonic Times","provider_url":"https:\/\/www.abrahamsconsulting.com\/blog","title":"AMD PRO Security - Security Features Designed In - TechTonic Times","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"fdB0vxs5gs\"><a href=\"https:\/\/www.abrahamsconsulting.com\/blog\/amd-pro-security-security-features-designed-in\/\">AMD PRO Security &#8211; Security Features Designed In<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.abrahamsconsulting.com\/blog\/amd-pro-security-security-features-designed-in\/embed\/#?secret=fdB0vxs5gs\" width=\"600\" height=\"338\" title=\"&#8220;AMD PRO Security &#8211; Security Features Designed In&#8221; &#8212; TechTonic Times\" data-secret=\"fdB0vxs5gs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.abrahamsconsulting.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/10\/Ryzen_5000_Pro_Security_2_thumb.jpg","thumbnail_width":600,"thumbnail_height":776,"description":"This security brief shows that, through a modern, multi-layered approach to security features, AMD processors help protect sensitive data from sophisticated attacks, avoid downtime, and reduce resource drain. The brief lists the most critical security features and their benefits\u2014as well as the AMD PRO security features that include them. Please contact Abrahams Consulting LLC, for more information about AMD processors and AMD PRO security features."}