{"version":"1.0","provider_name":"Fasti News","provider_url":"https:\/\/www.fastinews.com\/iNWS","title":"The ins and outs of threat emulation - Fasti News","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ECVNjmKktX\"><a href=\"https:\/\/www.fastinews.com\/iNWS\/the-ins-and-outs-of-threat-emulation\/\">The ins and outs of threat emulation<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.fastinews.com\/iNWS\/the-ins-and-outs-of-threat-emulation\/embed\/#?secret=ECVNjmKktX\" width=\"600\" height=\"338\" title=\"&#8220;The ins and outs of threat emulation&#8221; &#8212; Fasti News\" data-secret=\"ECVNjmKktX\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.fastinews.com\/iNWS\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.fastinews.com\/iNWS\/wp-content\/uploads\/2024\/11\/JsiJrxSjMKfjp2kjQjBwLb.jpg","thumbnail_width":970,"thumbnail_height":545,"description":"Traditional security testing often provides only a static snapshot of an organization&#039;s defenses, relying primarily on hypothetical scenarios and vulnerability scanners to identify potential weaknesses. While these methods offer some value, they often fall short in simulating the dynamic and evolving tactics employed by real-world adversaries. Threat emulation, on the other hand, takes a realistic approach to assessing an organization&#039;s security posture. This advanced testing methodolo.."}