{"version":"1.0","provider_name":"FlexBox AI","provider_url":"https:\/\/flexboxai.com\/ar","author_name":"flexboxai","author_url":"https:\/\/flexboxai.com\/ar\/author\/flexboxai\/","title":"Cybersecurity &amp; Cloud Computing - FlexBox AI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qDx5jqbaWP\"><a href=\"https:\/\/flexboxai.com\/ar\/cybersecurity-cloud-computing\/\">\u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0627\u0644\u062d\u0648\u0633\u0628\u0629 \u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/flexboxai.com\/ar\/cybersecurity-cloud-computing\/embed\/#?secret=qDx5jqbaWP\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity &amp; Cloud Computing&#8221; &#8212; FlexBox AI\" data-secret=\"qDx5jqbaWP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>","description":"FLEXIBLE AI FOR DYNAMIC SOLUTIONS Adaptive Cyber Security impact. Adaptive, Scalable, Secure, and Intelligent. FlexBox AI: The ultimate blend of flexibility and smart technology. Why Cybersecurity Matters Cybersecurity involves protecting systems, networks, and data from digital attacks. These attacks can lead to data breaches, financial losses, and damage to your company\u2019s reputation. At FlexBox AI, [&hellip;]","thumbnail_url":"https:\/\/flexboxai.com\/wp-content\/uploads\/2024\/07\/Logo-with-no-background-1-1024x806.png"}