{"version":"1.0","provider_name":"TechTonic Times","provider_url":"https:\/\/www.abrahamsconsulting.com\/blog","title":"What Encryption Means in Quantum Resistant Networks - TechTonic Times","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"m2R8JeuDKO\"><a href=\"https:\/\/www.abrahamsconsulting.com\/blog\/what-encryption-means-in-quantum-resistant-networks\/\">What Encryption Means in Quantum Resistant Networks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.abrahamsconsulting.com\/blog\/what-encryption-means-in-quantum-resistant-networks\/embed\/#?secret=m2R8JeuDKO\" width=\"600\" height=\"338\" title=\"&#8220;What Encryption Means in Quantum Resistant Networks&#8221; &#8212; TechTonic Times\" data-secret=\"m2R8JeuDKO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.abrahamsconsulting.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"In today's lightning fast data in motion universe, not knowing what key areas of security to focus on or what enterprise tech solutions you need to ensure appropriate, airtight network protection can make your head spin. But there's no need to panic. Thales has your back.  Listen to the podcast to learn how @Thales Encryption Network delivers ultimate network security within the realm of data in motion.  #DataInMotion"}