{"version":"1.0","provider_name":"Waratek","provider_url":"https:\/\/waratek.com","author_name":"Jacob Warren","author_url":"https:\/\/waratek.com\/author\/jwarrenwaratek-com\/","title":"The Many Flavors Of Application Security Technologies | Waratek","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VKum0CEO4k\"><a href=\"https:\/\/waratek.com\/blog\/the-many-flavors-of-application-security-technologies\/\">The Many Flavors Of Application Security Technologies<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/waratek.com\/blog\/the-many-flavors-of-application-security-technologies\/embed\/#?secret=VKum0CEO4k\" width=\"600\" height=\"338\" title=\"&#8220;The Many Flavors Of Application Security Technologies&#8221; &#8212; Waratek\" data-secret=\"VKum0CEO4k\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Nollaig Heffernan and Sean Martin weave, swerve and blast their way through a number of application security technologies looking at the history of the marketplace, the expansion of the technologies, how things stay the same even with the massive changes in continuous delivery and continuous integration.","thumbnail_url":"https:\/\/waratek.com\/wp-content\/uploads\/2022\/10\/default-social.png","thumbnail_width":1200,"thumbnail_height":630}