{"version":"1.0","provider_name":"TechTonic Times","provider_url":"https:\/\/www.abrahamsconsulting.com\/blog","title":"The Basics and Business of Trusted Security - TechTonic Times","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"BO23RRSIEH\"><a href=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/\">The Basics and Business of Trusted Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/embed\/#?secret=BO23RRSIEH\" width=\"600\" height=\"338\" title=\"&#8220;The Basics and Business of Trusted Security&#8221; &#8212; TechTonic Times\" data-secret=\"BO23RRSIEH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.abrahamsconsulting.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/07\/The_Basics_and_Business_of_Trusted_Security_thumb.jpg","thumbnail_width":600,"thumbnail_height":700,"description":"Do you expect trusted security from your servers? @HPE does and delivers it by providing protection from the hardware up through the stack into the OS, platform, and applications. Read this brochure to learn more \u2014and reach out to Abrahams Consulting LLC to configure your HPE ProLiant Gen11 server today."}