<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Security Leadership</provider_name><provider_url>https://heliview.com/security-leadership</provider_url><title>Een gerichte strategie voor supply chain security - Security Leadership</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="5K1NajuZqi"&gt;&lt;a href="https://heliview.com/security-leadership/6186-2/"&gt;Een gerichte strategie voor supply chain security&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://heliview.com/security-leadership/6186-2/embed/#?secret=5K1NajuZqi" width="600" height="338" title="&#x201C;Een gerichte strategie voor supply chain security&#x201D; &#x2014; Security Leadership" data-secret="5K1NajuZqi" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://heliview.com/security-leadership/wp-content/uploads/sites/19/2022/02/Supply-chain.png</thumbnail_url><thumbnail_width>1140</thumbnail_width><thumbnail_height>350</thumbnail_height><description>[vc_row][vc_column width=&#x201D;2/3&#x2033;][vc_column_text]Ondanks alle inspanningen op het gebied van informatiebeveiliging is de gemiddelde attack surface van organisaties alleen maar toegenomen. Door een veelvoud van kleine en grote kwetsbaarheden in alle supply chains bij elkaar opgeteld is het totale risico voor een organisatie bijna niet meer te</description></oembed>
