{"version":"1.0","provider_name":"TechTonic Times","provider_url":"https:\/\/www.abrahamsconsulting.com\/blog","title":"Hardware-enhanced Threat Protection - TechTonic Times","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zFzzLwwRCd\"><a href=\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/\">Hardware-enhanced Threat Protection<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/embed\/#?secret=zFzzLwwRCd\" width=\"600\" height=\"338\" title=\"&#8220;Hardware-enhanced Threat Protection&#8221; &#8212; TechTonic Times\" data-secret=\"zFzzLwwRCd\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.abrahamsconsulting.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/tdt_product_brief_thumb.jpg","thumbnail_width":600,"thumbnail_height":799,"description":"This product brief, brought to you by Abrahams Consulting LLC, introduces Intel\u00ae Threat Detection Technology (Intel\u00ae TDT)\u2014a set of technologies that harness hardware telemetry and acceleration capabilities to help identify threats and detect anomalous activity. Intel TDT uses the data gleaned to help identify polymorphic malware, file-less scripts, cryptomining, and other targeted attacks in real time and with minimal end-user impact."}