<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Inside Track Blog</provider_name><provider_url>https://www.microsoft.com/insidetrack/blog</provider_url><author_name>Lukas Velush</author_name><author_url>https://www.microsoft.com/insidetrack/blog/author/lukas-velush/</author_url><title>Security and Risk Management - How Microsoft does IT</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="K7EZoIt1kh"&gt;&lt;a href="https://www.microsoft.com/insidetrack/blog/security-3/"&gt;Security and Risk Management&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.microsoft.com/insidetrack/blog/security-3/embed/#?secret=K7EZoIt1kh" width="600" height="338" title="&#x201C;Security and Risk Management&#x201D; &#x2014; Inside Track Blog" data-secret="K7EZoIt1kh" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.microsoft.com/insidetrack/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.microsoft.com/insidetrack/blog/uploads/prod/2024/07/RW1itI7.jpg</thumbnail_url><thumbnail_width>2120</thumbnail_width><thumbnail_height>795</thumbnail_height><description>At Microsoft, our identity-driven security solutions protect users, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work. Artificial intelligence and machine learning help us automate mundane security tasks, and complex product integrations improve our threat detection and remediation efforts. Learn how Microsoft Digital supports our global workforce and secures valuable company and [&hellip;]</description></oembed>
