<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Security Leadership</provider_name><provider_url>https://heliview.com/security-leadership</provider_url><title>Whitepaper: How to Choose a Secrets Management Solution - Security Leadership</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="uKIS4axUS6"&gt;&lt;a href="https://heliview.com/security-leadership/secret-management-solution/"&gt;Whitepaper: How to Choose a Secrets Management Solution&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://heliview.com/security-leadership/secret-management-solution/embed/#?secret=uKIS4axUS6" width="600" height="338" title="&#x201C;Whitepaper: How to Choose a Secrets Management Solution&#x201D; &#x2014; Security Leadership" data-secret="uKIS4axUS6" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://heliview.com/security-leadership/wp-content/uploads/sites/19/2024/01/Thales-whitepaper.png</thumbnail_url><thumbnail_width>1140</thumbnail_width><thumbnail_height>350</thumbnail_height><description>[vc_row][vc_column width=&#x201D;2/3&#x2033;][vc_column_text]Modern IT environments are powered by an exponentially growing number of secrets. As organisations adopt cloud computing, containers, microservices and DevOps practices, the number of secrets required for authentication and encryption proliferates rapidly.</description></oembed>
