{"version":"1.0","provider_name":"State of Cyber Security","provider_url":"https:\/\/heliview.com\/state-cyber-security-sweden","title":"Cribl Solution Brief - State of Cyber Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"tBQX3fM5LH\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/cribl-solution-brief\/\">Cribl Solution Brief<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/cribl-solution-brief\/embed\/#?secret=tBQX3fM5LH\" width=\"600\" height=\"338\" title=\"&#8220;Cribl Solution Brief&#8221; &#8212; State of Cyber Security\" data-secret=\"tBQX3fM5LH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2024\/11\/Newsartible-Cribl.jpg","thumbnail_width":1140,"thumbnail_height":350,"description":"[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]This guide provides a holistic overview of how Cribl solutions can help your organization unlock the value of data, ensuring it\u2019s not just abundant but actionable and impactful. Read on for an overview of the solution\u2019s features, key capabilities, benefits, and deployment options.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;][\/vc_column][\/vc_row]"}