<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Titan Tech</provider_name><provider_url>https://www.titan.tech</provider_url><title>Implementing Zero Trust for Cincinnati Businesses - Titan Tech IT Support</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="3ANPAAtYan"&gt;&lt;a href="https://www.titan.tech/2023/01/implementing-zero-trust-for-cincinnati-businesses/"&gt;Implementing Zero Trust for Cincinnati Businesses&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.titan.tech/2023/01/implementing-zero-trust-for-cincinnati-businesses/embed/#?secret=3ANPAAtYan" width="600" height="338" title="&#x201C;Implementing Zero Trust for Cincinnati Businesses&#x201D; &#x2014; Titan Tech" data-secret="3ANPAAtYan" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.titan.tech/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.titan.tech/wp-content/uploads/2023/01/zero-trust-600x314.png</thumbnail_url><thumbnail_width>600</thumbnail_width><thumbnail_height>314</thumbnail_height><description>Zero trust is a security model that assumes that an attacker is already inside the network and seeks to limit the damage that an attacker can do. It is not just about securing the perimeter of the network, but also about securing the internal network and the endpoints. This is because in today's digital world, [&hellip;]</description></oembed>
