{"version":"1.0","provider_name":"B2C Engineering","provider_url":"https:\/\/www.b2c-engineering.com\/en\/","title":"Industrial Cybersecurity - B2C Engineering","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"JgxqyuZ1Xb\"><a href=\"https:\/\/www.b2c-engineering.com\/en\/industrial-cybersecurity\/\">Industrial Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.b2c-engineering.com\/en\/industrial-cybersecurity\/embed\/#?secret=JgxqyuZ1Xb\" width=\"600\" height=\"338\" title=\"&#8220;Industrial Cybersecurity&#8221; &#8212; B2C Engineering\" data-secret=\"JgxqyuZ1Xb\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.b2c-engineering.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2022\/08\/banner-cybersecurite-scaled.jpg","thumbnail_width":2560,"thumbnail_height":587,"description":"Our technological skills We audit your network(s) and industrial solutions to highlight breaches so that you can design a procedure to secure your plant for the years to come. Starting with our industrial cybersecurity audit combined with our partners, market leaders such as Siemens, Stormshield and Octoplant (former Versiondog), we advise you and install solutions [&hellip;]"}