{"version":"1.0","provider_name":"Interfacing","provider_url":"https:\/\/interfacing.com\/fr","author_name":"Dan Candido","author_url":"https:\/\/interfacing.com\/fr\/author\/dancandido","title":"CIS Contr\u00f4les de s\u00e9curit\u00e9 Conformit\u00e9","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Wbj9PUZeaq\"><a href=\"https:\/\/interfacing.com\/fr\/cis-controles-de-securite-conformite\">CIS Contr\u00f4les de s\u00e9curit\u00e9 Conformit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/interfacing.com\/fr\/cis-controles-de-securite-conformite\/embed#?secret=Wbj9PUZeaq\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0CIS Contr\u00f4les de s\u00e9curit\u00e9 Conformit\u00e9\u00a0\u00bb &#8212; Interfacing\" data-secret=\"Wbj9PUZeaq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/interfacing.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Apprenez comment les contr\u00f4les de s\u00e9curit\u00e9 CIS peuvent r\u00e9duire les risques de cybers\u00e9curit\u00e9 dans tous les secteurs d'activit\u00e9. D\u00e9couvrez les \u00e9tapes de la mise en \u0153uvre, les cas d'utilisation r\u00e9els et la fa\u00e7on dont l'IA et Interfacing peuvent vous aider.","thumbnail_url":"https:\/\/interfacing.com\/wp-content\/themes\/softec\/assets\/img\/hero\/hero-frame.png"}