{"version":"1.0","provider_name":"| Carahsoft","provider_url":"https:\/\/www.carahsoft.com\/wordpress","author_name":"The Carahsoft Team","author_url":"https:\/\/www.carahsoft.com\/wordpress\/author\/admin\/","title":"How CISOs Can Come to Grips With a New Priority \u2013 Securing the Supply Chain","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"f4MGXUWB73\"><a href=\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-securing-the-supply-chain-blog-2023\/\">How CISOs Can Come to Grips With a New Priority \u2013 Securing the Supply Chain<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-securing-the-supply-chain-blog-2023\/embed\/#?secret=f4MGXUWB73\" width=\"600\" height=\"338\" title=\"&#8220;How CISOs Can Come to Grips With a New Priority \u2013 Securing the Supply Chain&#8221; &#8212; | Carahsoft\" data-secret=\"f4MGXUWB73\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/02\/SolarWinds-Securing-the-Supply-Chain-Community-Blog_875X635.jpg","thumbnail_width":1215,"thumbnail_height":882,"description":"Security is an ongoing journey with no finish line, but federal agencies and their vendor ecosystem can become smarter and more cyber resilient if they are transparent, collaborate, and learn from previous attacks."}