{"version":"1.0","provider_name":"Microsoft Security Blog","provider_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","author_name":"Khetiwe Chitewere","author_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/khetiwe-chitewere\/","title":"What\u2019s Next in Security from Microsoft | Microsoft Security Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2JuVw4lYKV\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/10\/whats-next-in-security-from-microsoft\/\">What\u2019s Next in Security from Microsoft<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/10\/whats-next-in-security-from-microsoft\/embed\/#?secret=2JuVw4lYKV\" width=\"600\" height=\"338\" title=\"&#8220;What\u2019s Next in Security from Microsoft&#8221; &#8212; Microsoft Security Blog\" data-secret=\"2JuVw4lYKV\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_RemoteHome_025.jpg","thumbnail_width":1200,"thumbnail_height":800,"description":"On February 24, 2022, at the What\u2019s Next in Security from Microsoft digital event, you\u2019ll learn how a comprehensive approach to security will give you the confidence to take appropriate business risks that move your company forward. At this event, Vasu Jakkal, Microsoft Corporate Vice President of Security, Compliance, and Identity, and other security experts will share exciting new innovations that help reduce the risk from the latest threats."}