{"version":"1.0","provider_name":"CyCognito Blog","provider_url":"https:\/\/www.cycognito.com\/blog","author_name":"Emma Zaballos","title":"How to Supercharge your Vulnerability Remediation Process | CyCognito Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"WgNn9ghPjs\"><a href=\"https:\/\/www.cycognito.com\/blog\/how-to-supercharge-your-vulnerability-remediation-process\/\">How to Supercharge your Vulnerability Remediation Process<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cycognito.com\/blog\/how-to-supercharge-your-vulnerability-remediation-process\/embed\/#?secret=WgNn9ghPjs\" width=\"600\" height=\"338\" title=\"&#8220;How to Supercharge your Vulnerability Remediation Process&#8221; &#8212; CyCognito Blog\" data-secret=\"WgNn9ghPjs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Vulnerability remediation is the process of identifying and neutralizing security issues affecting cyber assets. Because these issues can cause millions of dollars in lost revenue, remediation costs, or fines if they result in a data breach or damage to cyber-infrastructure, vulnerability remediation is one of the most important parts of cybersecurity.","thumbnail_url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/actionable-context.png"}