{"version":"1.0","provider_name":"Ganex","provider_url":"https:\/\/www.ganex.com\/fr\/","author_name":"Fadwa.Ouadrhiri","author_url":"https:\/\/www.ganex.com\/fr\/author\/fadwa-ouadrhiri\/","title":"Cybers\u00e9curit\u00e9 et infrastructure de r\u00e9seaux - Ganex","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"N9TTWrAOpH\"><a href=\"https:\/\/www.ganex.com\/fr\/cybersecurite-et-infrastructure-de-reseaux\/\">Cybers\u00e9curit\u00e9 et infrastructure de r\u00e9seaux<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ganex.com\/fr\/cybersecurite-et-infrastructure-de-reseaux\/embed\/#?secret=N9TTWrAOpH\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cybers\u00e9curit\u00e9 et infrastructure de r\u00e9seaux\u00a0\u00bb &#8212; Ganex\" data-secret=\"N9TTWrAOpH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ganex.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Les menaces cybern\u00e9tiques augmentent \u2014 votre infrastructure est-elle prot\u00e9g\u00e9e ? La cybers\u00e9curit\u00e9 est devenue l\u2019un des plus grands d\u00e9fis du secteur, avec des attaques de piratage, des probl\u00e8mes li\u00e9s \u00e0 la gestion de la cha\u00eene d\u2019approvisionnement et des ran\u00e7ongiciels de plus en plus fr\u00e9quents dans l\u2019industrie des \u00e9nergies renouvelables. Parlez \u00e0 un expert S\u00e9curiser l\u2019avenir [&hellip;]","thumbnail_url":"https:\/\/www.ganex.com\/wp-content\/uploads\/2021\/03\/we-want-to-hear-new-1.jpg","thumbnail_width":1024,"thumbnail_height":683}