{"version":"1.0","provider_name":"marcsfirma","provider_url":"https:\/\/marcsfirma.com\/21","author_name":"Vanessa Sassi","author_url":"https:\/\/marcsfirma.com\/21\/author\/luca\/","title":"Protected Development Strategies and Security Elements - marcsfirma","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"4tNhjCJkG0\"><a href=\"http:\/\/marcsfirma.com\/21\/2023\/03\/12\/protected-development-strategies-and-security-elements\/\">Protected Development Strategies and Security Elements<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/marcsfirma.com\/21\/2023\/03\/12\/protected-development-strategies-and-security-elements\/embed\/#?secret=4tNhjCJkG0\" width=\"600\" height=\"338\" title=\"&#8222;Protected Development Strategies and Security Elements&#8220; &#8211; marcsfirma\" data-secret=\"4tNhjCJkG0\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/marcsfirma.com\/21\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Secure production methodologies assist with strengthen request security on the right stages of the SDLC. Integrated with each stage of the application development your life cycle (SDLC), protect development strategies allow security and compliance to become baked in to the entire expansion process. Additionally, they prevent security problems from happening during coding and testing, reducing [&hellip;]","thumbnail_url":"https:\/\/marcsfirma.com\/21\/wp-content\/uploads\/2017\/01\/marcsfirma_WS.jpg","thumbnail_width":200,"thumbnail_height":200}