{"version":"1.0","provider_name":"CyberAuditExperts","provider_url":"https:\/\/cyberauditexperts.com","author_name":"admin2366","author_url":"https:\/\/cyberauditexperts.com\/index.php\/author\/admin2366\/","title":"Audit s\u00e9curit\u00e9 GCP &#8211; CyberAuditExperts","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"KxmSSzFPo8\"><a href=\"https:\/\/cyberauditexperts.com\/index.php\/nos-prestations-cloud-public\/audit-securite-gcp\/\">Audit s\u00e9curit\u00e9 GCP<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cyberauditexperts.com\/index.php\/nos-prestations-cloud-public\/audit-securite-gcp\/embed\/#?secret=KxmSSzFPo8\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Audit s\u00e9curit\u00e9 GCP\u00a0\u00bb &#8212; CyberAuditExperts\" data-secret=\"KxmSSzFPo8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cyberauditexperts.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"D\u00e9couvrez notre gamme compl\u00e8te de prestations d&rsquo;audit de s\u00e9curit\u00e9 cloud public sur GCP. De l&rsquo;audit approfondi de configuration \u00e0 la gestion des cl\u00e9s, nous vous proposons des services personnalis\u00e9s pour identifier, corriger et pr\u00e9venir les risques potentiels. B\u00e9n\u00e9ficiez de notre expertise en mati\u00e8re de conformit\u00e9, de surveillance continue, et de recommandations pratiques pour garantir la [&hellip;]","thumbnail_url":"https:\/\/cyberauditexperts.com\/wp-content\/uploads\/2024\/01\/gcp-2.png"}