{"version":"1.0","provider_name":"Overkiz","provider_url":"https:\/\/www.overkiz.com\/en\/","author_name":"Jasna Musanovic","author_url":"https:\/\/www.overkiz.com\/en\/author\/jasna\/","title":"IoT: Security at the heart of challenges - Overkiz","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"8UX7YCJ2cW\"><a href=\"https:\/\/www.overkiz.com\/en\/blog\/iot-security-at-the-heart-of-challenges\/\">IoT: Security at the heart of challenges<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.overkiz.com\/en\/blog\/iot-security-at-the-heart-of-challenges\/embed\/#?secret=8UX7YCJ2cW\" width=\"600\" height=\"338\" title=\"&#8220;IoT: Security at the heart of challenges&#8221; &#8212; Overkiz\" data-secret=\"8UX7YCJ2cW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.overkiz.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.overkiz.com\/wp-content\/uploads\/2022\/03\/security.jpg","thumbnail_width":696,"thumbnail_height":478,"description":"With the boom in the number of smart devices, the deployment of 5G, and the escalation of remote work, our ultradigitized environment creates many opportunities for cybercrime, forcing IoT manufacturers to make security a priority. Risks and challenges If there"}