{"version":"1.0","provider_name":"Craft.co","provider_url":"https:\/\/global.craft.co","author_name":"craftcodev","author_url":"https:\/\/global.craft.co\/blog\/author\/craftcodev\/","title":"Building supply chain resilience through cyber risk mitigation.","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"e7xasICklj\"><a href=\"https:\/\/global.craft.co\/blog\/building-supply-chain-resilience-through-cyber-risk-mitigation\/\">Building supply chain resilience through cyber risk mitigation.<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/global.craft.co\/blog\/building-supply-chain-resilience-through-cyber-risk-mitigation\/embed\/#?secret=e7xasICklj\" width=\"600\" height=\"338\" title=\"&#8220;Building supply chain resilience through cyber risk mitigation.&#8221; &#8212; Craft.co\" data-secret=\"e7xasICklj\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/global.craft.co\/wp-content\/uploads\/2023\/11\/63b5d7626865db69babac946_60de38fd67c91044a9daed2e_Hero-1.jpg","thumbnail_width":1000,"thumbnail_height":662,"description":"Cyber attacks are the fastest growing crime in the U.S. and an increasingly top priority for both the private and public sectors. And it's no surprise why. The average cost of a data breach is $3.86 million and it takes an average of 280 days to identify and contain a breach."}